horizon3ai / CVE-2023-34051
VMware Aria Operations for Logs CVE-2023-34051
☆63Updated last year
Alternatives and similar repositories for CVE-2023-34051:
Users that are interested in CVE-2023-34051 are comparing it to the libraries listed below
- ☆85Updated last year
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆36Updated 2 years ago
- ☆113Updated last year
- ☆79Updated last year
- POC for Veeam Backup and Replication CVE-2023-27532☆63Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆108Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server☆89Updated 2 years ago
- To audit the security of read-only domain controllers☆114Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆41Updated last year
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆39Updated 10 months ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆176Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆83Updated last year
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆62Updated 11 months ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆46Updated last year
- Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519☆83Updated last year
- Exploit for the CVE-2024-5806☆43Updated 8 months ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆127Updated last year
- Golden collection of weak passwords☆61Updated 3 months ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆54Updated 8 months ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆80Updated 3 years ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆161Updated last year
- ☆95Updated last year
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆33Updated 9 months ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated last year