ruthvikvegunta / nagiosxi_rce-to-rootView external linksLinks
Nagios XI 5.5.6 Remote Code Execution and Privilege Escalation
☆14Aug 14, 2020Updated 5 years ago
Alternatives and similar repositories for nagiosxi_rce-to-root
Users that are interested in nagiosxi_rce-to-root are comparing it to the libraries listed below
Sorting:
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Script to locate mac-addresses☆11Oct 21, 2020Updated 5 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 2 months ago
- Script spam sms termux☆14Aug 24, 2020Updated 5 years ago
- Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation☆10Dec 15, 2019Updated 6 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- PoC for CVE-2016-1000027☆12Mar 5, 2021Updated 4 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- ☆13Dec 30, 2024Updated last year
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 7 months ago
- ☆12Mar 1, 2021Updated 4 years ago
- ☆12Mar 15, 2020Updated 5 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 10 months ago
- w4b-file : WebFile Analyzer is an advanced command-line utility meticulously crafted for web developers, security professionals, and rese…☆11Nov 16, 2023Updated 2 years ago
- New Tool To Unlock Hc Files Decryptor for HTTP Custom configuration files (LAPSCA)☆14Feb 16, 2023Updated 3 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- A REALLY Danger Windows Driver, Turn Any threads Ring0!☆13Aug 11, 2025Updated 6 months ago
- GPG Encrypts an IMAP folder☆12May 4, 2020Updated 5 years ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- programmatic binary patching using ptrace☆13Aug 9, 2025Updated 6 months ago
- A small tool to patch PE files' import address table with an external payload DLL.☆14Feb 7, 2026Updated last week
- Advanced PDF parsing for python☆12Jan 21, 2025Updated last year
- 在线安软识别☆12Aug 6, 2025Updated 6 months ago
- Summoner tracker overlay that synchronizes between teammates☆10Mar 23, 2023Updated 2 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago