rkxxz / CVE-2022-26809
☆78Updated this week
Related projects: ⓘ
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆80Updated 2 years ago
- ☆60Updated 2 years ago
- ☆47Updated last year
- ☆98Updated 2 years ago
- Dumping Windows Local Credentials Tools/Tricks☆66Updated 4 years ago
- Bypass cobaltstrike beacon config scan☆84Updated 3 years ago
- Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)☆24Updated 2 years ago
- Exchange2010 authorized RCE☆154Updated 3 years ago
- ☆126Updated this week
- CobaltStrike and Google Auth twice☆64Updated 2 years ago
- generate CobaltStrike's cross-platform payload☆33Updated 3 months ago
- Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)☆69Updated 2 years ago
- If you only have hash, you can still operate exchange☆66Updated 2 years ago
- ☆68Updated this week
- POC for RCE using vulnerabilities described in VMSA-2023-0001☆149Updated last year
- Microsoft Exchange Server Poc☆84Updated 2 years ago
- ☆108Updated this week
- Cobalt Strike < 4.4 dos CVE-2021-36798☆37Updated 3 years ago
- cve-2022-39197 poc☆74Updated last year
- PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers☆90Updated last year
- weaponized tool for CVE-2020-17144☆157Updated 3 years ago
- proxyshell payload generate☆72Updated 3 years ago
- POC of CVE-2021-2394☆39Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 2 years ago
- ☆20Updated this week
- CVE-2020-1472 C++☆83Updated 2 years ago
- Apache RocketMQ Arbitrary File Write Vulnerability Exploit☆40Updated last year
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆85Updated last year
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆144Updated 2 years ago
- 破解CS4.0☆159Updated 4 years ago