sfewer-r7 / CVE-2023-34362Links
CVE-2023-34362: MOVEit Transfer Unauthenticated RCE
☆64Updated last year
Alternatives and similar repositories for CVE-2023-34362
Users that are interested in CVE-2023-34362 are comparing it to the libraries listed below
Sorting:
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆102Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆115Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆115Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆70Updated 2 years ago
- .NET deserialization hunter☆81Updated last year
- ☆73Updated last year
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆79Updated 3 years ago
- Retrieve AD accounts description and search for password in it☆82Updated 3 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated last year
- ☆68Updated 11 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆110Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 3 years ago
- ☆55Updated 3 years ago
- Golden collection of weak passwords☆69Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 3 years ago
- To audit the security of read-only domain controllers☆118Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆85Updated 2 years ago
- ☆53Updated 2 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated 2 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated 2 years ago
- A LAPS dumper written using the impacket library.☆32Updated 2 years ago
- ACL abuse swiss-knife☆125Updated 2 years ago
- Exploits targeting vBulletin.☆75Updated 2 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- A proof-of-concept malicious Chrome extension☆84Updated 3 years ago
- Tool for efficient directory enumeration☆63Updated last year