horizon3ai / CVE-2023-26067
Lexmark CVE-2023-26067
☆23Updated last year
Alternatives and similar repositories for CVE-2023-26067:
Users that are interested in CVE-2023-26067 are comparing it to the libraries listed below
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆18Updated last year
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆14Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆14Updated 11 months ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Updated 3 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated last year
- OSED Practice binary☆24Updated last year
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆19Updated 7 months ago
- Exploit for Microsoft SharePoint 2019☆14Updated last year
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆20Updated last month
- Exploit for CVE-2024-4883☆9Updated 6 months ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆32Updated last month
- Simple shellcode injection in Nim encrypted in XOR☆22Updated last year
- Office 365 and Exchange Enumeration Version 2☆18Updated 11 months ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- Remotely dump NT hashes through Windows Crash dumps☆26Updated 2 months ago
- PoC repository for CVE-2023-29007☆33Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆46Updated last month
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆58Updated last year
- Tools for Attacking Pleasant Password Server☆21Updated last year
- ☆37Updated this week
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆62Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year