tiepologian / CVE-2023-23397View external linksLinks
Proof of Concept for CVE-2023-23397 in Python
☆25Mar 21, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-23397
Users that are interested in CVE-2023-23397 are comparing it to the libraries listed below
Sorting:
- ☆22Jul 15, 2023Updated 2 years ago
- ☆11Feb 13, 2024Updated 2 years ago
- exp for useful vuln☆12Jul 9, 2021Updated 4 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated 2 weeks ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆16Aug 24, 2023Updated 2 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Feb 24, 2022Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆127Mar 24, 2023Updated 2 years ago
- Python script for sending e-mails with CVE-2023-23397 payload using SMTP☆14Mar 22, 2023Updated 2 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆18Mar 25, 2022Updated 3 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Jul 16, 2023Updated 2 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆21Feb 9, 2026Updated last week
- CVE-2023-22621: SSTI to RCE by Exploiting Email Templates affecting Strapi Versions <=4.5.5☆24Apr 25, 2023Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆22Jan 6, 2026Updated last month
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Oct 20, 2023Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Jun 27, 2023Updated 2 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- A Programming Language designed to be written in Chinese | 中文编程语言 | 基于 golang 的中文脚本语言,完全使用中文编程 | 仅使 用 golang 标准库实现,不使用任何第三方库☆14Jun 18, 2024Updated last year
- jmreport/qurestSql 未授权SQL注入批量扫描poc Jeecg-Boot是一款基于Spring Boot和Jeecg-Boot-Plus的快速开发平台,最新的jeecg-boot 3.5.0 中被爆出多个SQL注入漏洞。☆21Jun 20, 2023Updated 2 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- OpenSSH Pre-Auth Double Free CVE-2023-25136 POC☆47Apr 21, 2023Updated 2 years ago
- Remote Linux Loadable Kernel Module (LKM) rootkit (For Linux Kernels 5.x). Shell command execution by ping.☆22Jul 24, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- shiro <= 1.2.4 反序列化远程命令执行利用脚本☆52Jun 21, 2021Updated 4 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 2 months ago
- ☆23Jun 17, 2024Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated last year
- ☆24Jun 9, 2024Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Apr 19, 2022Updated 3 years ago