sqrtZeroKnowledge / CVE-2023-23397_EXPLOIT_0DAYLinks
Exploit for the CVE-2023-23397
☆162Updated 2 years ago
Alternatives and similar repositories for CVE-2023-23397_EXPLOIT_0DAY
Users that are interested in CVE-2023-23397_EXPLOIT_0DAY are comparing it to the libraries listed below
Sorting:
- Github as C2 Demonstration , free API = free C2 Infrastructure☆140Updated last year
- Evasive Golang Loader☆131Updated 10 months ago
- ☆154Updated 10 months ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆194Updated 6 months ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆101Updated 11 months ago
- ☆136Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆141Updated 4 months ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆209Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- POC for Veeam Backup and Replication CVE-2023-27532☆63Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆200Updated 7 months ago
- ☆117Updated 2 months ago
- Attempt at Obfuscated version of SharpCollection☆216Updated last week
- Weaponized HellsGate/SigFlip☆199Updated last year
- Patching AmsiOpenSession by forcing an error branching☆145Updated last year
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 3 years ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- ☆164Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆239Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆177Updated 2 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆200Updated 3 months ago
- AV EVASION TECHNIQUES☆80Updated 2 years ago
- Different methods to get current username without using whoami☆176Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆169Updated 7 months ago
- ☆183Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆108Updated 2 weeks ago
- Extracting NetNTLM without touching lsass.exe☆235Updated last year