ihebski / CVE-2024-3400
CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect
☆29Updated last year
Alternatives and similar repositories for CVE-2024-3400
Users that are interested in CVE-2024-3400 are comparing it to the libraries listed below
Sorting:
- ☆56Updated 6 months ago
- Situational Awareness script to identify how and where to run implants☆49Updated 5 months ago
- Cobalt Strike BOFS☆16Updated last year
- A Moodle Scanner☆41Updated 6 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 11 months ago
- A small red team course☆37Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- ☆52Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- PowerShell script to generate ShellCode in various formats☆41Updated 7 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆21Updated 8 months ago
- ☆38Updated 3 weeks ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 8 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 7 months ago
- RCE PoC for Empire C2 framework <5.9.3☆27Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- Used to get NTLMv2 Hashes from SMB☆12Updated 6 months ago
- List of some AD tools I frequently use☆45Updated 3 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- A collection of PoCs for different injection techniques on Windows!☆44Updated last year
- ☆34Updated 8 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 5 months ago