oskarsve / ms-teams-rce
β1,115Updated 4 years ago
Alternatives and similar repositories for ms-teams-rce:
Users that are interested in ms-teams-rce are comparing it to the libraries listed below
- Avast JavaScript Interactive Shellβ670Updated 5 years ago
- SkySafe Miscellaneous Reverse Engineering Blogβ766Updated last year
- πͺ Leak git repositories from misconfigured websitesβ1,563Updated 2 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agentβ535Updated 3 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victimβs NAT/firewaβ¦β1,919Updated 2 years ago
- A tool for IDN homograph attacks and detection.β734Updated 4 years ago
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. Tβ¦β949Updated 3 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.β621Updated 4 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victiβ¦β1,516Updated 5 months ago
- PoC exploits for software vulnerabilitiesβ678Updated 3 years ago
- β2,497Updated 2 years ago
- DNS covert channel implant for Red Teams.β731Updated 5 years ago
- Some stuff about Hardware Hackingβ585Updated 8 months ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shellβ1,708Updated 3 years ago
- PoC for CVE-2021-3156 (sudo heap overflow)β434Updated 2 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ6,837Updated last year
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.β890Updated 10 months ago
- Repository for information about 0-days exploited in-the-wild.β781Updated this week
- Utility to find AES keys in running processesβ334Updated last year
- $50 Million CTF from Hackerone - Writeupβ590Updated 5 years ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windowsβ379Updated 3 years ago
- Credentials Dumper for Linux using eBPFβ1,136Updated 6 months ago
- Materials for Windows Malware Analysis training (volume 1)β1,971Updated 8 months ago
- Tracking history of USB events on GNU/Linuxβ1,162Updated 2 years ago
- Interactive CTF Exploration Toolβ1,654Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environmentsβ2,085Updated 3 years ago
- Test tool for CVE-2020-1472β1,764Updated last year
- Exploit for CVE-2019-11043β1,808Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.β1,372Updated 2 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCEβ792Updated 10 months ago