sqrtZeroKnowledge / CVE-2023-23397_EXPLOIT_0DAY
Exploit for the CVE-2023-23397
☆159Updated last year
Alternatives and similar repositories for CVE-2023-23397_EXPLOIT_0DAY:
Users that are interested in CVE-2023-23397_EXPLOIT_0DAY are comparing it to the libraries listed below
- Github as C2 Demonstration , free API = free C2 Infrastructure☆132Updated last year
- Evasive Golang Loader☆132Updated 6 months ago
- Attempt at Obfuscated version of SharpCollection☆203Updated this week
- Use ESC1 to perform a makeshift DCSync and dump hashes☆203Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆137Updated last month
- Execute shellcode from a remote-hosted bin file using Winhttp.☆229Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆96Updated 7 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated 2 years ago
- PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/☆19Updated 9 months ago
- ☆138Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆185Updated 3 months ago
- 「💀」Proof of concept on BYOVD attack☆154Updated 2 months ago
- ☆149Updated 7 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆251Updated 6 months ago
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Updated 2 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆272Updated 3 months ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆187Updated 3 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆186Updated 4 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆268Updated 3 months ago
- Awesome AV/EDR/XDR Bypass Tips☆261Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆144Updated 9 months ago
- AV bypass while you sip your Chai!☆217Updated 8 months ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- ☆270Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆229Updated last year
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- ☆220Updated 9 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆230Updated last year
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago