verylazytech / CVE-2024-4358Links
Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024
☆12Updated 11 months ago
Alternatives and similar repositories for CVE-2024-4358
Users that are interested in CVE-2024-4358 are comparing it to the libraries listed below
Sorting:
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal☆16Updated 11 months ago
- Exploit for CVE-2024-5009☆13Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆24Updated last year
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆45Updated last year
- ☆12Updated last year
- Unix Process hollowing in rust☆22Updated 10 months ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Updated last year
- BOF for C2 framework☆44Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- ☆25Updated 3 months ago
- ☆58Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated last year
- ☆56Updated 4 months ago
- Dump Linux keyrings☆20Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 6 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆63Updated 9 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated last year
- Enable or Disable TokenPrivilege(s)☆14Updated last year
- Beacon Object Files (BOF) for Cobalt Strike.☆32Updated last year
- Exploit for CVE-2024-4883☆11Updated last year
- bring your own clean ntdll (or other MS dlls)☆28Updated 4 months ago
- in-process powershell runner for BRC4☆48Updated 2 years ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Updated 9 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated last year
- Keycloak admin API allows low privilege users to use administrative functions☆27Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆76Updated 2 months ago
- ☆38Updated 11 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 10 months ago