horizon3ai / CVE-2022-1388
POC for CVE-2022-1388
☆232Updated 3 years ago
Alternatives and similar repositories for CVE-2022-1388
Users that are interested in CVE-2022-1388 are comparing it to the libraries listed below
Sorting:
- CVE-2022-26134 Proof of Concept☆164Updated 2 years ago
- ☆293Updated 10 months ago
- Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles☆387Updated 2 years ago
- POC for VMWARE CVE-2022-22954☆281Updated 3 years ago
- Authenticated Remote Command Execution in Gitlab via GitHub import☆222Updated 2 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆275Updated 3 years ago
- ☆407Updated 2 years ago
- HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907☆362Updated 3 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆329Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- ☆520Updated 3 years ago
- ☆382Updated 3 years ago
- ☆214Updated 2 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆157Updated 3 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆327Updated 2 years ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆112Updated last year
- Proof of Concept Exploit for vCenter CVE-2021-21972☆260Updated 4 years ago
- WSO2 RCE (CVE-2022-29464) exploit and writeup.☆373Updated 3 years ago
- A REAL DoS exploit for CVE-2022-21907☆130Updated 3 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆464Updated 2 years ago
- Automatic ProxyShell Exploit☆114Updated 3 years ago
- VMware vCenter 7.0.2.00100 unauth Arbitrary File Read + SSRF + Reflected XSS☆221Updated 3 years ago
- Demos for the Blackhat USA 2022 talk "Taking Kerberos to the Next Level"☆258Updated 2 years ago
- Simple executable generator with encrypted shellcode.☆282Updated 2 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆774Updated last year
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆366Updated 3 years ago
- ☆154Updated 2 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆181Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆288Updated 3 years ago
- C# Lsass parser☆291Updated 3 years ago