sinsinology / CVE-2024-29849Links
Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)
☆90Updated last year
Alternatives and similar repositories for CVE-2024-29849
Users that are interested in CVE-2024-29849 are comparing it to the libraries listed below
Sorting:
- ☆44Updated last month
- ☆92Updated 9 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆92Updated last year
- ☆59Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Pre-Auth Exploit for CVE-2024-40711☆53Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆76Updated last year
- ☆161Updated last year
- ☆68Updated 9 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 11 months ago
- ☆35Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 9 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 10 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- ☆72Updated 9 months ago
- Dump Windows SAM hashes☆42Updated 2 years ago
- Bash and ZSH integration for Impacket☆73Updated last week
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated 2 years ago
- ☆72Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆45Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 8 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated last week
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆101Updated last year
- List of some AD tools I frequently use☆48Updated last week
- PowerShell Reverse Shell☆79Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- ☆90Updated 4 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆90Updated 2 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year