dinosn / CVE-2024-20931Links
CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839
☆61Updated last year
Alternatives and similar repositories for CVE-2024-20931
Users that are interested in CVE-2024-20931 are comparing it to the libraries listed below
Sorting:
- Cobalt Strike plugin☆52Updated last year
- EWSTool是一个针对EXCHANGE邮件服务器的后渗透利用工具。使用ews接口,实现人员邮箱列表获取、搜索邮件、下载邮件等实用功能。☆61Updated 4 months ago
- ☆41Updated last year
- 修改:https://github.com/projectdiscovery/cdncheck☆49Updated last year
- weblogic批量打入内存马,electron+vue3+springboot实现。☆54Updated last year
- 绕过defender的完整项目☆33Updated last year
- The Poc for CVE-2024-20931☆73Updated last year
- 域横向,内网信息收集利用工具☆30Updated 2 years ago
- Exchange 用户名爆破☆37Updated 7 months ago
- Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)☆96Updated 2 years ago
- cobaltstrike的BypassUAC、提权dll插件☆84Updated 8 months ago
- ☆26Updated 3 years ago
- 集成了截图 键盘记录 剪贴版功能,用于网络限制场景下的信息搜集☆84Updated last year
- 精简版搜集工具☆15Updated 11 months ago
- Confluence后台rce☆20Updated last year
- MemShell List☆83Updated 2 years ago
- 一键出网探测工具☆74Updated 2 years ago
- 二维码钓鱼☆35Updated last year
- 一款打供应商必备的代码获取工具☆18Updated last year
- 哥斯拉webshell管理工具的插件,用于连接websocket型webshell☆127Updated last year
- HCM宏景加解密工具☆47Updated last month
- 分享ABC_123自己改造的ysoserial工具,java反序列化漏洞利用,生成的java反序列化利用链支持jdk1.5版本的老旧系统的利用。☆55Updated 4 months ago
- 直接导入需要碰撞的IP和域名,工具多线程碰撞速度快,访问状态码200成功时则会高亮。☆54Updated last year
- 检测域内常见一把梭漏洞,包括:NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare☆61Updated last year
- Exchange 信息收集工具☆53Updated 7 months ago
- 子域名爆破,增加了智能爬虫功能☆70Updated last year
- pathScan 是一个用Go编写的路径扫描、信息收集、指纹探索工具☆48Updated 8 months ago
- CVE-2023-38646 Metabase RCE☆53Updated last year
- nuclei templates, poc/exp☆1Updated 7 months ago
- confluence CVE-2023-22527 漏洞利用工具,支持冰蝎/哥斯拉内存马注入,支持设置 http 代理☆41Updated last year