tiktb8 / CVE-2022-29072Links
Powershell to mitigate CVE-2022-29072
☆6Updated 3 years ago
Alternatives and similar repositories for CVE-2022-29072
Users that are interested in CVE-2022-29072 are comparing it to the libraries listed below
Sorting:
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆27Updated 2 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- ☆14Updated 4 months ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆18Updated 9 months ago
- Windows 权限提升 BadPotato☆13Updated 4 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Burp Suite Extension useful to inspect UPnP security☆16Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆29Updated 2 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated last year
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated 2 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Updated 3 years ago
- Map remote .NET assemblies to memory for further invocation.☆41Updated 3 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 4 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- RCE in NPM VSCode Extension☆20Updated 4 years ago