horizon3ai / CVE-2022-40684
A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager
☆349Updated 2 years ago
Alternatives and similar repositories for CVE-2022-40684:
Users that are interested in CVE-2022-40684 are comparing it to the libraries listed below
- POC for CVE-2022-39952☆267Updated 2 years ago
- ☆407Updated 2 years ago
- Authenticated Remote Command Execution in Gitlab via GitHub import☆222Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆430Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆395Updated last year
- VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)☆232Updated last year
- RCE exploit for CVE-2023-3519☆223Updated last year
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆133Updated 11 months ago
- One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html☆405Updated 5 months ago
- exploit for f5-big-ip RCE cve-2023-46747☆203Updated 6 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆542Updated last year
- Kraken, a modular multi-language webshell coded by @secu_x11☆543Updated last year
- A script to automate privilege escalation with CVE-2023-22809 vulnerability☆155Updated 2 years ago
- ☆771Updated 2 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆275Updated 3 years ago
- CVE-2022-26134 Proof of Concept☆164Updated 2 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆126Updated 2 years ago
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated 2 years ago
- RCE exploit for dompdf☆176Updated 3 years ago
- CVE-2023-24055 PoC (KeePass 2.5x)☆253Updated 2 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆548Updated 5 months ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆258Updated last year
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆231Updated last year
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆135Updated last year
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆870Updated 2 years ago
- Useful C2 techniques and cheatsheets learned from engagements☆498Updated 3 weeks ago
- Awesome AV/EDR/XDR Bypass Tips☆270Updated 2 years ago
- A REAL DoS exploit for CVE-2022-21907☆130Updated 3 years ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆112Updated last year
- POC for VMWARE CVE-2022-22954☆281Updated 3 years ago