p0dalirius / CVE-2022-45771-Pwndoc-LFI-to-RCE
Pwndoc local file inclusion to remote code execution of Node.js code on the server
☆46Updated last month
Alternatives and similar repositories for CVE-2022-45771-Pwndoc-LFI-to-RCE:
Users that are interested in CVE-2022-45771-Pwndoc-LFI-to-RCE are comparing it to the libraries listed below
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆47Updated 2 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆23Updated last month
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆21Updated last month
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆60Updated last week
- ☆54Updated 4 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆44Updated last year
- Recon scripts for Red Team and Web blackbox auditing☆23Updated last month
- ☆52Updated last year
- ☆14Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- ☆11Updated 8 months ago
- PowerShell Reverse Shell☆61Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆26Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆48Updated 2 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆110Updated 3 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 7 months ago
- Situational Awareness script to identify how and where to run implants☆48Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 9 months ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated 11 months ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆20Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 3 months ago