rootsecdev / CVE-2023-46604Links
Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)
☆15Updated 10 months ago
Alternatives and similar repositories for CVE-2023-46604
Users that are interested in CVE-2023-46604 are comparing it to the libraries listed below
Sorting:
- CobaltStrike beacon written in golang☆27Updated 2 years ago
- ☆17Updated 2 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆51Updated 3 months ago
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated last year
- BypassCredGuard CS BOF☆42Updated 5 months ago
- PAN-OS auth bypass + RCE☆46Updated 7 months ago
- CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection☆17Updated 9 months ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Updated 11 months ago
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆24Updated last year
- ☆19Updated last month
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆54Updated last year
- ☆57Updated 11 months ago
- CVE-2024-40711-exp☆42Updated 8 months ago
- The king of shell -Javaweb Memory Shell☆24Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated last year
- Groovy Post Exploitation☆20Updated 8 months ago
- Help red teams find opsec processes during engagements☆41Updated 6 months ago
- Exploit for CVE-2024-29847☆18Updated 9 months ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- A Simple PoC☆21Updated last year
- ownCloud exploits for CVE-2023-49105☆36Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Updated 9 months ago
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆26Updated last year
- Winsocket for Cobalt Strike.☆98Updated last year
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆41Updated 8 months ago
- ☆33Updated 3 months ago
- More EFS coerced authentication method with PetitPotam.py☆24Updated 2 years ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆46Updated 10 months ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago