horizon3ai / CVE-2023-34362
MOVEit CVE-2023-34362
☆138Updated last year
Alternatives and similar repositories for CVE-2023-34362:
Users that are interested in CVE-2023-34362 are comparing it to the libraries listed below
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆229Updated last year
- Exploit for the CVE-2023-23397☆160Updated last year
- ☆162Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆249Updated 6 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆266Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆273Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆68Updated 6 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆135Updated last year
- Find Microsoft Exchange instance for a given domain and identify the exact version☆186Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated last year
- A shellcode injection tool showcasing various process injection techniques☆134Updated last year
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆126Updated 2 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆276Updated 3 months ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆123Updated last year
- Everything and anything related to password spraying☆132Updated 9 months ago
- Escalate Service Account To LocalSystem via Kerberos☆393Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆90Updated 9 months ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆195Updated 8 months ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- Attempt at Obfuscated version of SharpCollection☆203Updated 2 weeks ago
- A collection of Cobalt Strike Aggressor scripts.☆92Updated 3 years ago
- Windows Privilege Escalation☆55Updated 2 years ago
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆230Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆68Updated 5 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆142Updated last year
- Automated exploitation of MSSQL servers at scale☆106Updated last month