☆1,108Dec 8, 2020Updated 5 years ago
Alternatives and similar repositories for ms-teams-rce
Users that are interested in ms-teams-rce are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆2,667Mar 5, 2024Updated 2 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆123Oct 20, 2020Updated 5 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Dec 15, 2023Updated 2 years ago
- Writeup of CVE-2020-15906☆49Oct 26, 2020Updated 5 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Oct 9, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆366Apr 14, 2022Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆959Dec 31, 2021Updated 4 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,284Nov 3, 2020Updated 5 years ago
- ☆705Nov 27, 2024Updated last year
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆830Jun 12, 2021Updated 4 years ago
- ☆2,515Jan 2, 2023Updated 3 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,970Jan 14, 2023Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- ☆1,381Jul 2, 2020Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,452Dec 18, 2022Updated 3 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Aug 5, 2022Updated 3 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- Mimikatz implementation in pure Python☆3,257Jan 2, 2026Updated 2 months ago
- ☆695Jul 4, 2022Updated 3 years ago
- Deserialization payload generator for a variety of .NET formatters☆3,691Dec 23, 2024Updated last year
- RCE 0-day for GhostScript 9.50 - Payload generator☆544Sep 8, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Notes about attacking Jenkins servers☆2,089Jul 10, 2024Updated last year
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- PoC exploits for software vulnerabilities☆690Aug 21, 2021Updated 4 years ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆226Jun 1, 2021Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆223Dec 5, 2020Updated 5 years ago
- Red Team C code repo☆569Dec 16, 2024Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,168Sep 29, 2021Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,649Jul 18, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆282Nov 12, 2021Updated 4 years ago
- ☆297Jul 2, 2024Updated last year
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆856Apr 16, 2025Updated 11 months ago
- ☆1,202Sep 2, 2022Updated 3 years ago
- Collection of Offensive C# Tooling☆1,471Feb 6, 2023Updated 3 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,363Sep 30, 2024Updated last year