hackerschoice / CVE-2021-26855
PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github
☆61Updated 4 years ago
Alternatives and similar repositories for CVE-2021-26855:
Users that are interested in CVE-2021-26855 are comparing it to the libraries listed below
- ☆70Updated 4 years ago
- ☆99Updated 4 years ago
- Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.☆38Updated 3 years ago
- DO NOT RUN THIS.☆47Updated 3 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 4 years ago
- CVE-2021-3560 Local PrivEsc Exploit☆78Updated 3 years ago
- The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813☆68Updated 5 years ago
- Git-lfs RCE exploit CVE-2020-27955 - tested on Windows on: git, gh cli, GitHub Desktop, Visual Studio, SourceTree etc.☆30Updated 4 years ago
- Checks for signature requirements over LDAP☆96Updated 2 years ago
- Example Vulnerable .NET HTTP Remoting☆83Updated 6 years ago
- SonicWALL SSL-VPN Web Server Vulnerable Exploit☆47Updated 4 years ago
- Citrix ADC Vulns☆86Updated 4 years ago
- Some private tools i decided to release for public.☆49Updated last year
- juicypotato for win10 > 1803 & win server 2019☆96Updated 4 years ago
- Gopher Tomcat Deployer☆48Updated 6 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Updated 4 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- PoC para las vulnerabilidades CVE-2020-14750 y cve-2020-14882☆47Updated 4 years ago
- PoC CVE-2020-6308☆34Updated 4 years ago
- ☆157Updated 2 years ago
- ProxyLogon Pre-Auth SSRF To Arbitrary File Write☆123Updated last year
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆67Updated 3 years ago
- PoC exploits for CVE-2020-17382☆115Updated 4 years ago
- cve-2020-0688 UNIVERSAL Python implementation utilizing ASPX webshell for command output☆23Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- A standalone WMI protocol for CrackMapExec☆51Updated 5 years ago
- Exploitation toolkit for RichFaces☆103Updated last year
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆107Updated 4 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Updated 3 years ago