horizon3ai / CVE-2024-9464View external linksLinks
Proof of Concept Exploit for CVE-2024-9464
☆45Oct 9, 2024Updated last year
Alternatives and similar repositories for CVE-2024-9464
Users that are interested in CVE-2024-9464 are comparing it to the libraries listed below
Sorting:
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- ☆158Jul 10, 2024Updated last year
- ☆19Sep 24, 2025Updated 4 months ago
- PoC☆12Apr 7, 2025Updated 10 months ago
- Advanced test for proxy & waf☆13Feb 10, 2026Updated last week
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- ☆33Jan 23, 2025Updated last year
- ☆13Apr 14, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Mar 6, 2025Updated 11 months ago
- ☆38Dec 14, 2024Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆121Jan 15, 2025Updated last year
- BINARLY Research Tools and PoCs☆40Sep 27, 2024Updated last year
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)☆96Sep 1, 2023Updated 2 years ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Oct 2, 2023Updated 2 years ago
- Oracle WebLogic CVE-2022-21371☆19Aug 31, 2022Updated 3 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆60Jul 23, 2025Updated 6 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 7 months ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated 11 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆318Mar 27, 2025Updated 10 months ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- cve-2024-42327 ZBX-25623☆36Dec 1, 2024Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Jun 30, 2021Updated 4 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- ☆159Dec 13, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆339Oct 7, 2024Updated last year
- A local privilege escalation vulnerability in VMware vCenter Server (and VMware Cloud Foundation) caused by a misconfiguration of sudo, a…☆58Jul 9, 2024Updated last year