horizon3ai / CVE-2023-27532Links
POC for Veeam Backup and Replication CVE-2023-27532
☆63Updated 2 years ago
Alternatives and similar repositories for CVE-2023-27532
Users that are interested in CVE-2023-27532 are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆88Updated 11 months ago
- CVE-2023-20198 Exploit PoC☆48Updated last year
- ACL abuse swiss-knife☆123Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 8 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆177Updated 2 years ago
- List of some AD tools I frequently use☆46Updated 3 months ago
- Automated exploitation of MSSQL servers at scale☆108Updated last week
- ☆158Updated last year
- To audit the security of read-only domain controllers☆117Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆83Updated 3 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last year
- PowerShell Reverse Shell☆78Updated 2 years ago
- Active Directory Authentication Library☆73Updated 3 weeks ago
- ☆117Updated 2 months ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆109Updated 2 years ago
- ☆85Updated 4 months ago
- Pre-Auth Exploit for CVE-2024-40711☆49Updated 8 months ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆156Updated last year
- C# havoc implant☆99Updated 2 years ago
- Tool for MSSQL relay audit and abuse☆47Updated 5 months ago
- ☆56Updated last year
- Lateral Movement☆125Updated last year
- ☆88Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆71Updated 11 months ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆91Updated last year
- Dump Windows SAM hashes☆42Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 3 months ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 3 years ago