horizon3ai / CVE-2022-1388Links
POC for CVE-2022-1388
☆232Updated 3 years ago
Alternatives and similar repositories for CVE-2022-1388
Users that are interested in CVE-2022-1388 are comparing it to the libraries listed below
Sorting:
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆277Updated 3 years ago
- CVE-2022-26134 Proof of Concept☆164Updated 3 years ago
- ☆382Updated 3 years ago
- ☆293Updated 11 months ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆158Updated 3 years ago
- ☆408Updated 2 years ago
- VMware vCenter 7.0.2.00100 unauth Arbitrary File Read + SSRF + Reflected XSS☆221Updated 3 years ago
- Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles☆388Updated 2 years ago
- Demos for the Blackhat USA 2022 talk "Taking Kerberos to the Next Level"☆259Updated 2 years ago
- Authenticated Remote Command Execution in Gitlab via GitHub import☆222Updated 2 years ago
- One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html☆405Updated 6 months ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆329Updated 3 years ago
- ☆521Updated 3 years ago
- HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907☆362Updated 3 years ago
- ☆214Updated 2 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆328Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆177Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆291Updated 3 years ago
- A REAL DoS exploit for CVE-2022-21907☆130Updated 3 years ago
- POC for VMWARE CVE-2022-22954☆281Updated 3 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 4 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆367Updated 3 years ago
- Automatic ProxyShell Exploit☆114Updated 3 years ago
- ☆86Updated 3 years ago
- New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.☆293Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated 2 years ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆114Updated last year
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 2 years ago
- Simple executable generator with encrypted shellcode.☆282Updated 2 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆210Updated 3 years ago