sinsinology / CVE-2024-5009Links
Exploit for CVE-2024-5009
☆13Updated last year
Alternatives and similar repositories for CVE-2024-5009
Users that are interested in CVE-2024-5009 are comparing it to the libraries listed below
Sorting:
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated 11 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆24Updated last year
- Exploit for CVE-2024-4883☆11Updated last year
- ☆38Updated last year
- ☆35Updated last year
- Beacon Object Files (BOF) for Cobalt Strike.☆32Updated last year
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated 2 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆26Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆42Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- ☆45Updated 2 months ago
- RCE through a race condition in Apache Tomcat☆56Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆27Updated 11 months ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆41Updated 10 months ago
- ☆59Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Updated 8 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 11 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆103Updated 2 years ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆76Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Updated 5 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆115Updated last year
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆45Updated 6 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 2 weeks ago
- List of some AD tools I frequently use☆53Updated last month
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆90Updated 3 months ago