p0dalirius / CVE-2022-45771-Pwndoc-LFI-to-RCELinks
Pwndoc local file inclusion to remote code execution of Node.js code on the server
☆46Updated 11 months ago
Alternatives and similar repositories for CVE-2022-45771-Pwndoc-LFI-to-RCE
Users that are interested in CVE-2022-45771-Pwndoc-LFI-to-RCE are comparing it to the libraries listed below
Sorting:
- A repository with my code snippets for research/education purposes.☆52Updated 2 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆25Updated 11 months ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆24Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Updated 3 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated 3 months ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆40Updated 2 months ago
- Discord C2 Profile for Mythic☆33Updated 10 months ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆77Updated 2 years ago
- ☆75Updated 9 months ago
- ☆47Updated 3 years ago
- Remote Template Injection Toolkit☆46Updated last year
- Cobalt Strike BOFS☆16Updated 2 years ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆59Updated 11 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- ☆53Updated 2 years ago
- ☆29Updated 2 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Updated 11 months ago
- Automated exploitation of MSSQL servers at scale☆128Updated last month
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 3 years ago
- ☆59Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Updated 9 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆25Updated last year
- ☆55Updated 3 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago