rootsecdev / CVE-2023-46604
Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)
☆14Updated 8 months ago
Alternatives and similar repositories for CVE-2023-46604:
Users that are interested in CVE-2023-46604 are comparing it to the libraries listed below
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Updated 9 months ago
- ☆16Updated 2 years ago
- BypassCredGuard CS BOF☆37Updated 3 months ago
- CVE-2024-40711-exp☆41Updated 6 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆48Updated last month
- CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection☆16Updated 7 months ago
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated 11 months ago
- Beacon Object Files.☆35Updated last year
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆54Updated last year
- Using LNK files and user input simulation to start processes under explorer.exe☆25Updated 7 months ago
- Ivanti EPM AgentPortal RCE Vulnerability☆21Updated 7 months ago
- Exploit for CVE-2024-29847☆18Updated 7 months ago
- CobaltStrike beacon written in golang☆26Updated 2 years ago
- ☆69Updated last year
- Groovy Post Exploitation☆20Updated 6 months ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆18Updated last year
- ProcExp Driver (Ab)use☆21Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆45Updated 2 years ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆46Updated last year
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆21Updated 10 months ago
- AV/EDR killer using BYOVD technique☆31Updated 6 months ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆13Updated 3 years ago
- PAN-OS auth bypass + RCE☆45Updated 5 months ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- AD Pentest Cheatsheet by BlackWasp☆21Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆32Updated last month
- Winsocket for Cobalt Strike.☆98Updated last year
- dump lsass tool☆39Updated 2 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆59Updated 2 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year