testanull / Project_CVE-2021-21985_PoC
☆31Updated 3 years ago
Alternatives and similar repositories for Project_CVE-2021-21985_PoC:
Users that are interested in Project_CVE-2021-21985_PoC are comparing it to the libraries listed below
- proxyshell payload generate☆72Updated 3 years ago
- ☆54Updated 3 years ago
- Csharp 反射加载dll☆39Updated 3 years ago
- SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE☆47Updated 3 years ago
- Cobalt Strike AggressorScripts CVE-2020-0796☆79Updated 4 years ago
- Py写的tsh的流量加解密过程。☆28Updated 2 years ago
- external c2 use domainhiding.☆49Updated 4 years ago
- ☆37Updated 6 years ago
- Exchange ProxyRelay POC☆37Updated 2 years ago
- Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587☆40Updated 2 years ago
- 使得Cobaltstrike支持Atexec☆87Updated 4 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 2 years ago
- resource-based constrained delegation RBCD☆43Updated 3 years ago
- CVE-2021-26855 & CVE-2021-27065☆27Updated 3 years ago
- CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)☆44Updated 4 years ago
- Citrix ADC从权限绕过到RCE☆46Updated 4 years ago
- CVE-2021-36798: CobaltStrike < 4.4 Dos☆103Updated 3 years ago
- just test☆65Updated 2 years ago
- vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)☆38Updated 3 years ago
- Bypass cobaltstrike beacon config scan☆84Updated 3 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 3 years ago
- ☆28Updated 4 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆45Updated 3 years ago
- ☆91Updated 6 years ago
- Github Security Daily Repository.☆45Updated 2 years ago
- CVE-2020-10199 回显版本☆31Updated 7 months ago
- Microsoft Exchange Server Poc☆84Updated 3 years ago
- 动态加解密shellcode并上线☆23Updated 3 years ago
- SystemGap - Maintenance Tools after privilege escalation☆40Updated 7 months ago
- CVE-2021-21972☆32Updated 3 years ago