goichot / CVE-2020-3153Links
Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal
☆106Updated 5 years ago
Alternatives and similar repositories for CVE-2020-3153
Users that are interested in CVE-2020-3153 are comparing it to the libraries listed below
Sorting:
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- This is a Poc for BIGIP iControl unauth RCE☆51Updated 4 years ago
- ☆71Updated 4 years ago
- Some private tools i decided to release for public.☆49Updated last year
- ☆38Updated 5 years ago
- Parse NTLM challenge messages over HTTP and SMB☆148Updated 3 years ago
- sploit☆67Updated 6 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Updated 5 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Updated 4 years ago
- Yet another LSASS dumper☆74Updated 4 years ago
- Proof-of-concept code for various bugs☆111Updated last year
- Basic password spraying tool for internal tests and red teaming☆91Updated 5 years ago
- POC for NetworkService PrivEsc☆127Updated 5 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Updated 5 years ago
- Scans for .NET Deserialization Bugs in .NET Assemblies☆79Updated last year
- Port of Invoke-Excel4DCOM☆104Updated 6 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Updated 5 years ago
- A little tool to play with Kerberos.☆66Updated 2 years ago
- named pipe server with impersonation☆60Updated 6 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 5 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- A sort of simple shell which support multiple protocols.☆99Updated 6 years ago
- ☆35Updated 3 years ago
- guest→system(UAC手动提权)☆74Updated 5 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 5 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Updated 5 years ago
- Spray a hash via smb to check for local administrator access☆142Updated 4 years ago
- ☆198Updated 5 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago