oskarsve / ms-teams-rceView external linksLinks
☆1,109Dec 8, 2020Updated 5 years ago
Alternatives and similar repositories for ms-teams-rce
Users that are interested in ms-teams-rce are comparing it to the libraries listed below
Sorting:
- ☆2,663Mar 5, 2024Updated last year
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆368Apr 14, 2022Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆951Dec 31, 2021Updated 4 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Dec 15, 2023Updated 2 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Oct 9, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,867Aug 18, 2023Updated 2 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- ☆1,376Jul 2, 2020Updated 5 years ago
- Writeup of CVE-2020-15906☆49Oct 26, 2020Updated 5 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,277Nov 3, 2020Updated 5 years ago
- ☆709Nov 27, 2024Updated last year
- Mimikatz implementation in pure Python☆3,239Jan 2, 2026Updated last month
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆829Jun 12, 2021Updated 4 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Aug 5, 2022Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,641Aug 28, 2025Updated 5 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,963Jan 14, 2023Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,438Dec 18, 2022Updated 3 years ago
- Notes about attacking Jenkins servers☆2,090Jul 10, 2024Updated last year
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆661Feb 1, 2025Updated last year
- Deserialization payload generator for a variety of .NET formatters☆3,669Dec 23, 2024Updated last year
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆852Apr 16, 2025Updated 10 months ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,167May 26, 2023Updated 2 years ago
- ☆2,513Jan 2, 2023Updated 3 years ago
- Collection of Offensive C# Tooling☆1,467Feb 6, 2023Updated 3 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆642Dec 9, 2019Updated 6 years ago
- ☆1,201Sep 2, 2022Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,606Jul 18, 2024Updated last year
- ☆694Jul 4, 2022Updated 3 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,516Feb 5, 2026Updated last week
- ☆284Nov 12, 2021Updated 4 years ago
- A tool to exploit .NET Remoting Services☆535Jul 31, 2024Updated last year
- RCE 0-day for GhostScript 9.50 - Payload generator☆544Sep 8, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,722Jan 16, 2026Updated last month
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,791Jul 29, 2025Updated 6 months ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,175Aug 15, 2024Updated last year
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,804Sep 17, 2024Updated last year
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,346Sep 30, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago