s1ckb017 / PoC-CVE-2022-26809
PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.
☆107Updated 2 years ago
Alternatives and similar repositories for PoC-CVE-2022-26809:
Users that are interested in PoC-CVE-2022-26809 are comparing it to the libraries listed below
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆154Updated last year
- DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019☆70Updated last year
- ☆134Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆106Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆134Updated last year
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆126Updated 2 years ago
- DCSync Attack from Outside using Impacket☆112Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆125Updated last year
- MSSQL Database Attacker tool☆190Updated 2 years ago
- CVE-2021-40444☆64Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆135Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆166Updated 3 months ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- Exploit for the CVE-2023-23397☆159Updated last year
- AV/EDR evasion via direct system calls.☆107Updated last year
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆121Updated 2 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆199Updated 2 years ago
- ☆182Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆295Updated 2 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆323Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- A basic emulation of an "RPC Backdoor"☆240Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆299Updated 2 years ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated 11 months ago
- A REAL DoS exploit for CVE-2022-21907☆130Updated 2 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆185Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆218Updated 2 years ago
- A BOF to automate common persistence tasks for red teamers☆273Updated last year