hakivvi / proxylogonLinks
RCE exploit for Microsoft Exchange Server (CVE-2021-26855).
☆22Updated 3 years ago
Alternatives and similar repositories for proxylogon
Users that are interested in proxylogon are comparing it to the libraries listed below
Sorting:
- Tool to get NT system shell .☆11Updated 4 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Updated 4 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.☆40Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Polymorphic code obfuscator for use in Red Team operations☆31Updated 3 years ago
- Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers☆83Updated last year
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆94Updated 4 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 5 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 6 months ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 3 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆22Updated 3 years ago
- Windows internals and exploitation tricks☆105Updated 4 months ago
- CVE-2022-30780 - lighttpd remote denial of service☆17Updated last year
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆38Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆64Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆40Updated 4 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆49Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated last year
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- ☆53Updated 3 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Updated 2 years ago