n3m1sys / CVE-2023-22809-sudoedit-privescView external linksLinks
A script to automate privilege escalation with CVE-2023-22809 vulnerability
☆160Feb 15, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-22809-sudoedit-privesc
Users that are interested in CVE-2023-22809-sudoedit-privesc are comparing it to the libraries listed below
Sorting:
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- CVE-2024-40711-exp☆42Oct 17, 2024Updated last year
- ☆216Mar 29, 2024Updated last year
- ☆30Nov 7, 2022Updated 3 years ago
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆400Feb 6, 2023Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆19Apr 30, 2021Updated 4 years ago
- exploit for CVE-2022-2588☆485Mar 4, 2023Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆136Jan 22, 2025Updated last year
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- LPE exploit for CVE-2023-21768☆506Jul 10, 2023Updated 2 years ago
- C# version of Powermad☆170Dec 5, 2023Updated 2 years ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆115Oct 20, 2024Updated last year
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Sep 22, 2022Updated 3 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Nov 12, 2022Updated 3 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Jan 9, 2022Updated 4 years ago
- POC for CVE-2021-21974 VMWare ESXi RCE Exploit☆186Jul 9, 2021Updated 4 years ago
- CVE-2021-21975 vRealize Operations Manager SSRF☆13Mar 31, 2021Updated 4 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆128Jan 19, 2023Updated 3 years ago
- ☆322Jan 13, 2023Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61May 24, 2022Updated 3 years ago
- Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409) exploit☆83Oct 7, 2024Updated last year
- ☆705Nov 7, 2023Updated 2 years ago
- UAC_wenpon☆49Nov 25, 2021Updated 4 years ago
- ☆16May 20, 2022Updated 3 years ago
- CVE-2023-24055 PoC (KeePass 2.5x)☆254Feb 10, 2023Updated 3 years ago
- If you only have hash, you can still operate exchange☆78Oct 21, 2021Updated 4 years ago
- ☆539Nov 20, 2021Updated 4 years ago
- PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers☆95Jan 10, 2023Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆305Dec 30, 2021Updated 4 years ago
- A tool written in golang which compress using UPX and patch it with the provided PE file to make "UPX -d" flag impossible to decompress a…☆28Jan 2, 2025Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Windows NTLM Authentication Backdoor☆241Jan 15, 2025Updated last year
- ☆197Aug 28, 2025Updated 5 months ago
- Source Code Management Attack Toolkit☆225Sep 20, 2022Updated 3 years ago
- 利用RPC服务,内网批量探测Windows出网☆14Jun 24, 2022Updated 3 years ago
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Mar 6, 2023Updated 2 years ago