lanzt / CVE-2020-14321Links
Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager role to RCE.
☆20Updated 4 years ago
Alternatives and similar repositories for CVE-2020-14321
Users that are interested in CVE-2020-14321 are comparing it to the libraries listed below
Sorting:
- Exploits for some windows binaries :)☆53Updated 2 months ago
- Windows reverse shell GUI☆101Updated 4 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆91Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆24Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- Linux Persistence Toolkit☆73Updated 3 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Updated 5 years ago
- Course enrolments allowed privilege escalation from teacher role into manager role to RCE☆44Updated 4 years ago
- rcat☆75Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29Updated 7 years ago
- CVE-2023-2255 Libre Office☆63Updated 2 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 3 years ago
- CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7☆144Updated 3 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- Reverse TCP shell in PowerShell for fun. Made in spring 2020 with inspiration from (and a few fixes to) samratashok/nishang Invoke-PowerS…☆73Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- ☆94Updated 5 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 3 years ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Updated 5 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Updated 3 years ago
- Exploit to dump ipmi hashes☆37Updated 2 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆105Updated 3 weeks ago
- Malicious Shortcut(.lnk) Generator☆86Updated 7 years ago
- CVE-2021-27928 MariaDB/MySQL-'wsrep provider' 命令注入漏洞☆63Updated 2 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆27Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Updated last year
- SeRestorePrivilege to SYSTEM☆132Updated 4 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 4 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year