POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)
☆16Oct 6, 2021Updated 4 years ago
Alternatives and similar repositories for ProxyShell_POC
Users that are interested in ProxyShell_POC are comparing it to the libraries listed below
Sorting:
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Oct 12, 2021Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Docker image for SQLiScanner☆15Jul 26, 2017Updated 8 years ago
- CVE-2021-40444☆66Dec 19, 2021Updated 4 years ago
- Framework for Telegram users and chats investigating☆74Jun 5, 2025Updated 9 months ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- CVE-2021-40346 integer overflow enables http smuggling☆32Sep 28, 2021Updated 4 years ago
- Verify data integrity with hyper-realistic generative faces☆33Sep 6, 2024Updated last year
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 2 years ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- 🌵 Command and Action routine Server☆16Updated this week
- Pocsuite3 For CVE-2021-22205☆86Oct 28, 2021Updated 4 years ago
- Create visualization from Shodan query☆74May 25, 2021Updated 4 years ago
- A template for standard Maltego transformation☆13Dec 8, 2021Updated 4 years ago
- AADInternals Authenticator Android App☆11Jul 2, 2020Updated 5 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- A basic proxylogon scanner☆27Aug 11, 2021Updated 4 years ago
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆77Jan 10, 2022Updated 4 years ago
- ☆14Dec 13, 2021Updated 4 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- PoC of CVE-2022-24707☆13May 3, 2022Updated 3 years ago
- ☆49Jul 14, 2020Updated 5 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- 🕵️♂️ Investigate Google emails and documents.☆19Dec 6, 2021Updated 4 years ago
- ☆17Oct 12, 2020Updated 5 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆327Mar 9, 2022Updated 4 years ago
- iOS App to Record Daily Sun Intake☆16May 20, 2022Updated 3 years ago
- Opencart Bruteforce and Upload Image☆11Aug 13, 2019Updated 6 years ago
- ☆11Feb 8, 2022Updated 4 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Sep 26, 2021Updated 4 years ago
- How to hack webcams☆10Jan 7, 2022Updated 4 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆187Aug 3, 2025Updated 7 months ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 3 years ago