p33d / CVE-2024-45519Links
☆42Updated 10 months ago
Alternatives and similar repositories for CVE-2024-45519
Users that are interested in CVE-2024-45519 are comparing it to the libraries listed below
Sorting:
- ☆68Updated 6 months ago
- Bruteforces Fortinet SSL VPNs☆57Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Fortinet FortiClient EMS SQL Injection☆50Updated last year
- ☆34Updated 11 months ago
- Dump Windows SAM hashes☆42Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆28Updated last year
- List of some AD tools I frequently use☆47Updated last month
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆89Updated 8 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 9 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- Repo for all my exploits/PoCs☆51Updated 3 months ago
- ☆57Updated 8 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 6 months ago
- ☆43Updated 3 weeks ago
- POC for Veeam Backup and Replication CVE-2023-27532☆64Updated 2 years ago
- ☆87Updated 3 weeks ago
- Authentication Bypass in GoAnywhere MFT☆63Updated last year
- PoC for CVE-2024-42327 / ZBX-25623☆18Updated 8 months ago
- RCE through a race condition in Apache Tomcat☆56Updated 7 months ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆96Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆104Updated last year
- Exploit for the CVE-2024-5806☆45Updated last year
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆25Updated 2 years ago
- GeoServer Remote Code Execution☆82Updated 4 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆121Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year