s1ckb017 / PoC-CVE-2022-26809Links
PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.
☆107Updated 2 years ago
Alternatives and similar repositories for PoC-CVE-2022-26809
Users that are interested in PoC-CVE-2022-26809 are comparing it to the libraries listed below
Sorting:
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 3 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆154Updated last year
- MSSQL Database Attacker tool☆189Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆125Updated 3 years ago
- CVE-2021-40444☆65Updated 3 years ago
- DCSync Attack from Outside using Impacket☆114Updated 3 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆83Updated 3 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆139Updated last year
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆127Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers☆80Updated last year
- AV/EDR evasion via direct system calls.☆108Updated last year
- Extendable payload obfuscation and delivery framework☆143Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆129Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- ☆163Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆301Updated 2 years ago
- Beacon Object File PoC implementation of KillDefender☆227Updated 3 years ago
- A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.☆113Updated 4 months ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆114Updated last year
- ☆183Updated 2 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆181Updated 3 years ago
- ☆154Updated 3 years ago
- DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019☆69Updated 2 years ago
- A REAL DoS exploit for CVE-2022-21907☆130Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆140Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆298Updated 2 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- Full disclosures for CVE ids, proofs of concept, exploits, 0day bugs and so on.☆112Updated 2 years ago