Nagios XI 5.5.6 Remote Code Execution and Privilege Escalation
☆14Aug 14, 2020Updated 5 years ago
Alternatives and similar repositories for nagiosxi_rce-to-root
Users that are interested in nagiosxi_rce-to-root are comparing it to the libraries listed below
Sorting:
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- ☆13Dec 30, 2024Updated last year
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- Windows command line utility to set Intel FIVR voltage offset.☆13Mar 7, 2021Updated 5 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- ☆12Mar 15, 2020Updated 5 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 11 months ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Tracking Google Enterprise Android Devices☆21Updated this week
- Summoner tracker overlay that synchronizes between teammates☆10Mar 23, 2023Updated 2 years ago
- New Tool To Unlock Hc Files Decryptor for HTTP Custom configuration files (LAPSCA)☆14Feb 16, 2023Updated 3 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- 在线安软识别☆12Aug 6, 2025Updated 7 months ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- A REALLY Danger Windows Driver, Turn Any threads Ring0!☆13Aug 11, 2025Updated 6 months ago
- Download browser extension's source code as zip☆21Nov 23, 2025Updated 3 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- This is a termux sms booming tool☆11Aug 20, 2023Updated 2 years ago
- Advanced PDF parsing for python☆12Jan 21, 2025Updated last year
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Install dnscrypt-proxy on Ubuntu 18.04☆10Dec 15, 2018Updated 7 years ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- A small tool to patch PE files' import address table with an external payload DLL.☆16Feb 15, 2026Updated 3 weeks ago
- Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation☆10Dec 15, 2019Updated 6 years ago
- Script spam sms termux☆14Aug 24, 2020Updated 5 years ago
- w4b-file : WebFile Analyzer is an advanced command-line utility meticulously crafted for web developers, security professionals, and rese…☆11Nov 16, 2023Updated 2 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- programmatic binary patching using ptrace☆13Aug 9, 2025Updated 7 months ago
- ☆12Mar 1, 2021Updated 5 years ago
- Code written during contests and challenges by HackTheBox. Hack The Box is an online cybersecurity training platform to level up hacking …☆10Feb 1, 2022Updated 4 years ago
- It's a CLI Unity DLL Injector.☆12Aug 8, 2019Updated 6 years ago