rootsecdev / CVE-2023-46604Links
Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)
☆15Updated 10 months ago
Alternatives and similar repositories for CVE-2023-46604
Users that are interested in CVE-2023-46604 are comparing it to the libraries listed below
Sorting:
- Ivanti EPM AgentPortal RCE Vulnerability☆20Updated 8 months ago
- CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection☆16Updated 8 months ago
- ☆17Updated 2 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆45Updated last year
- CVE-2024-40711-exp☆42Updated 7 months ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Updated 10 months ago
- PAN-OS auth bypass + RCE☆45Updated 6 months ago
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆26Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆50Updated 3 months ago
- Groovy Post Exploitation☆20Updated 7 months ago
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆24Updated last year
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆47Updated last year
- Winsocket for Cobalt Strike.☆98Updated last year
- Remotely dump NT hashes through Windows Crash dumps☆27Updated 7 months ago
- BypassCredGuard CS BOF☆39Updated 4 months ago
- Exploit for CVE-2024-29847☆18Updated 8 months ago
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- Beacon Object Files.☆35Updated last year
- CVE-2023-21707 EXP☆28Updated last year
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆26Updated 11 months ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- Help red teams find opsec processes during engagements☆40Updated 5 months ago
- A Simple PoC☆21Updated last year
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆55Updated last year
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆39Updated 7 months ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆46Updated 10 months ago
- Its a coff loader ported to go( Modified by TimWhite )☆27Updated last year
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Updated last year