horizon3ai / Ivanti-EPM-Coercion-VulnerabilitiesView external linksLinks
Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others
β13Feb 19, 2025Updated 11 months ago
Alternatives and similar repositories for Ivanti-EPM-Coercion-Vulnerabilities
Users that are interested in Ivanti-EPM-Coercion-Vulnerabilities are comparing it to the libraries listed below
Sorting:
- Make your terminal string output even more beautiful πβ11Jul 27, 2025Updated 6 months ago
- CVE-2024-53691β14Jan 13, 2025Updated last year
- CVE-2024-28995 POC Vulnerability Scannerβ13Jun 15, 2024Updated last year
- β96Jul 10, 2025Updated 7 months ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploitβ18Jun 3, 2024Updated last year
- β19Dec 5, 2024Updated last year
- PAN-OS auth bypass + RCEβ47Nov 19, 2024Updated last year
- β25Jan 23, 2025Updated last year
- Post-exploitation tool for attacking Active Directory domain controllersβ18Dec 18, 2022Updated 3 years ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855β20Jun 17, 2024Updated last year
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POCβ20Nov 19, 2024Updated last year
- β94Jan 16, 2025Updated last year
- β21Feb 22, 2025Updated 11 months ago
- Pre-Auth Exploit for CVE-2024-40711β55Sep 15, 2024Updated last year
- β76Jan 27, 2025Updated last year
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflβ¦β52Jan 11, 2025Updated last year
- Manage Engine Decrypterβ24Oct 17, 2022Updated 3 years ago
- Salesforce Policy Deviation Checkerβ30Sep 30, 2020Updated 5 years ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]β27Jun 3, 2024Updated last year
- β24Feb 12, 2016Updated 10 years ago
- Utility to decompress Linux swsusp hibernation file.β28Aug 11, 2021Updated 4 years ago
- β25Nov 2, 2021Updated 4 years ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responderβ36Dec 12, 2025Updated 2 months ago
- PoCβ104Updated this week
- AV/EDR killer using BYOVD techniqueβ43Sep 27, 2024Updated last year
- β68Jan 16, 2025Updated last year
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applicationsβ32Nov 4, 2022Updated 3 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)β33Jun 28, 2019Updated 6 years ago
- EDRStartupHinder: A red team tool to prevent Antivirus and EDR from running.β183Jan 11, 2026Updated last month
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampiβ¦β66Aug 14, 2025Updated 6 months ago
- β159May 5, 2025Updated 9 months ago
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsingβ32Jun 6, 2024Updated last year
- Tool to extract username and password of current user from PanGPA in plaintextβ89Dec 23, 2024Updated last year
- A penetration testing tool for odoo applications.β74Jan 17, 2026Updated last month
- β10Jan 26, 2026Updated 3 weeks ago
- Enumerate RIDs using pure Pythonβ32Jan 5, 2026Updated last month
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.β10Apr 3, 2022Updated 3 years ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.β260Nov 22, 2025Updated 2 months ago
- β10Jan 27, 2026Updated 3 weeks ago