RCE exploit for attack chain in "A Saga of Code Executions on Zimbra" post
☆36Oct 2, 2021Updated 4 years ago
Alternatives and similar repositories for Zimbra-RCE-exploit
Users that are interested in Zimbra-RCE-exploit are comparing it to the libraries listed below
Sorting:
- CVE-2022-30525 Zyxel 防火墙命令注入漏洞 POC&EXPC☆12May 28, 2022Updated 3 years ago
- 命令行版向日葵RCE漏洞利用工具 / cmd version of sunlogin exploit tool☆15Mar 26, 2022Updated 3 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Sep 28, 2022Updated 3 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- Apache CouchDB 3.2.1 - Remote Code Execution (RCE)☆29May 20, 2022Updated 3 years ago
- GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)☆16May 9, 2024Updated last year
- jsfind burp插件版☆18May 27, 2022Updated 3 years ago
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Dec 9, 2022Updated 3 years ago
- Attack SQL Server through gopher protocol☆21Nov 22, 2021Updated 4 years ago
- CVE-2020-4464 / CVE-2020-4450☆36Aug 24, 2021Updated 4 years ago
- Automatically scan jar packages by using ast to find fastjson gadgets. In particular, this project is limited to mining Gadgets that may …☆49Mar 8, 2022Updated 4 years ago
- wo ee cve-2022-2185 gitlab authenticated rce☆80Jul 29, 2022Updated 3 years ago
- Zimbra <9.0.0.p27 RCE☆107Nov 24, 2022Updated 3 years ago
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Feb 26, 2022Updated 4 years ago
- spring-core漏洞自检工具☆10Jul 6, 2023Updated 2 years ago
- Yapi mock script RCE another version. Webshell way. 另一种 Webshell 方式的 Yapi 命令执行的方法 相比于其他的利用方式 更加微操和可控 影响更小☆66Jul 4, 2024Updated last year
- 一个加壳工具☆62May 17, 2019Updated 6 years ago
- ☆49Jan 2, 2024Updated 2 years ago
- 使用Csharp实现自动修改注册表键并强制锁屏,使其可被抓取明文密码。☆30Dec 3, 2020Updated 5 years ago
- Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587☆42Mar 14, 2022Updated 4 years ago
- ☆69Aug 11, 2020Updated 5 years ago
- ☆53Jun 22, 2022Updated 3 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆48Sep 27, 2021Updated 4 years ago
- CS shellcode 加载器☆61Jan 7, 2022Updated 4 years ago
- ☆12Aug 31, 2020Updated 5 years ago
- ☆15Aug 6, 2021Updated 4 years ago
- 基于go语言的致远OA漏洞检测工具☆39Oct 28, 2022Updated 3 years ago
- Code By:Tas9er / 亿邮电子邮件系统批量远程命令执行☆36Apr 11, 2021Updated 4 years ago
- CVE-2021-22555 Exploit☆13Jul 28, 2022Updated 3 years ago
- Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947☆77Nov 14, 2022Updated 3 years ago
- ☆25Apr 30, 2021Updated 4 years ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago
- 对Exchange Proxyshell 做了二次修改,精确的拆分、实现辅助性安全测试。☆17Nov 23, 2021Updated 4 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- xxl-job未授权命令执行☆114Feb 8, 2022Updated 4 years ago
- Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC☆111Mar 6, 2022Updated 4 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server☆91Jan 21, 2023Updated 3 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆41May 14, 2022Updated 3 years ago