horizon3ai / CVE-2022-1388
POC for CVE-2022-1388
☆230Updated 2 years ago
Related projects: ⓘ
- CVE-2022-26134 Proof of Concept☆156Updated 2 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆269Updated 2 years ago
- A Sliver GUI Client☆288Updated last year
- Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles☆359Updated last year
- ☆400Updated last year
- ☆376Updated 3 years ago
- Demos for the Blackhat USA 2022 talk "Taking Kerberos to the Next Level"☆256Updated 2 years ago
- ☆497Updated 2 years ago
- ☆289Updated 2 months ago
- ☆269Updated this week
- ☆127Updated this week
- Authenticated Remote Command Execution in Gitlab via GitHub import☆219Updated last year
- WSO2 RCE (CVE-2022-29464) exploit and writeup.☆365Updated 2 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆452Updated 2 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆436Updated 5 months ago
- POC for VMWARE CVE-2022-22954☆281Updated 2 years ago
- Cobalt Strike random C2 Profile generator☆618Updated last year
- Simple executable generator with encrypted shellcode.☆280Updated last year
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆360Updated 2 years ago
- HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907☆362Updated 2 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆258Updated 2 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆327Updated 2 years ago
- A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆339Updated last year
- C# Lsass parser☆277Updated 2 years ago
- Cobalt Strike kit for Persistence☆462Updated 4 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆319Updated 2 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆250Updated 11 months ago
- One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html☆392Updated last year
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆710Updated 9 months ago
- A REAL DoS exploit for CVE-2022-21907☆129Updated 2 years ago