dinosn / CVE-2024-20931
CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839
☆61Updated last year
Alternatives and similar repositories for CVE-2024-20931:
Users that are interested in CVE-2024-20931 are comparing it to the libraries listed below
- The Poc for CVE-2024-20931☆73Updated last year
- Exchange 用户名爆破☆35Updated 2 months ago
- 域横向,内网信息收集利用工具☆30Updated 2 years ago
- ☆26Updated 3 years ago
- weblogic批量打入内存马,electron+vue3+springboot实现。☆50Updated last year
- 直接导入需要碰撞的IP和域名,工具 多线程碰撞速度快,访问状态码200成功时则会高亮。☆53Updated last year
- FscanSnipaste_1.8.2_001_内网快速连接工具☆44Updated last year
- ☆41Updated last year
- Zerologon exploit with restore DC password automatically☆133Updated last year
- Confluence后台rce☆19Updated last year
- Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具☆107Updated last year
- 新免杀方向 Mimikatz(猕猴桃) 免杀 360,火绒,电脑管家,WindowsDefinder,详细使用教程请参考博客:https://www.vpss.cc/381.html☆23Updated last year
- 绕过defender的完整项目☆33Updated 11 months ago
- cobaltstrike 直接判断目标beacon存在的杀软☆45Updated 3 years ago
- CVE-2023-46604☆62Updated last year
- ☆34Updated last year
- Yonyou-UNSERIALIZE,用友NC 反序列化检查工具,批量检测用友NC 反序列化☆50Updated last year
- 批量获取域内机器桌面文件☆79Updated 2 years ago
- 二维码钓鱼☆32Updated last year
- Text4Shell的burp被动扫描插件☆36Updated 2 years ago
- 哥斯拉webshell管理工具的插件,用于连接websocket型webshell☆89Updated 11 months ago
- text4shell(CVE-2022-42889) BurpSuite Scanner☆20Updated 2 years ago
- ☆33Updated last year
- 分享ABC_123自己改造的ysoserial工具,java反序列化漏洞利用,生成的java反序列化利用链支持jdk1.5版本的老旧系统的利用。☆44Updated 2 weeks ago
- cobaltstrike的BypassUAC、提权dll插件☆79Updated 4 months ago
- MemShell List☆79Updated last year
- 根据攻防以及域信息收集经验dump快而有用的域信息☆103Updated last year
- ☆19Updated 2 years ago
- 精简版搜集工具☆13Updated 6 months ago
- 哥斯拉二开,基于公开的免杀哥斯拉更改的流量特征。请求包改成json请求!☆25Updated last month