mbadanoiu / CVE-2024-37081
CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server
☆10Updated 7 months ago
Alternatives and similar repositories for CVE-2024-37081:
Users that are interested in CVE-2024-37081 are comparing it to the libraries listed below
- Exploit for CVE-2024-29847☆18Updated 5 months ago
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆24Updated last year
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆13Updated 6 months ago
- CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection☆14Updated 5 months ago
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆25Updated 9 months ago
- ☆16Updated last year
- The king of shell -Javaweb Memory Shell☆22Updated last year
- ☆31Updated 2 years ago
- ownCloud exploits for CVE-2023-49105☆36Updated last year
- dump lsass tool☆39Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆18Updated last year
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆47Updated last year
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆79Updated 2 years ago
- Exploit for Microsoft SharePoint 2019☆14Updated last year
- Exchange ProxyRelay POC☆37Updated 2 years ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆24Updated 8 months ago
- CVE-2023-21707 EXP☆28Updated last year
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Updated 2 years ago
- CVE-2024-40711-exp☆38Updated 4 months ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆21Updated 5 months ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated last year
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆13Updated 2 years ago
- PAN-OS auth bypass + RCE☆44Updated 3 months ago
- BOF/COFF obj file to PIC(shellcode). by golang☆37Updated 2 years ago
- CobaltStrike Extentions☆38Updated 3 years ago
- More EFS coerced authentication method with PetitPotam.py☆22Updated last year
- AD Pentest Cheatsheet by BlackWasp☆20Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆44Updated last year
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆32Updated 4 months ago