verylazytech / CVE-2024-4358Links
Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024
☆12Updated 10 months ago
Alternatives and similar repositories for CVE-2024-4358
Users that are interested in CVE-2024-4358 are comparing it to the libraries listed below
Sorting:
- POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal☆16Updated 10 months ago
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- Exploit for CVE-2024-5009☆13Updated last year
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- ☆12Updated last year
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆19Updated 6 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated last year
- Unix Process hollowing in rust☆22Updated 10 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆44Updated last year
- ☆38Updated 10 months ago
- Exploit for CVE-2024-4883☆11Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated last year
- Dump Linux keyrings☆20Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆76Updated last month
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆12Updated last week
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 9 months ago
- ☆58Updated last year
- BOF for C2 framework☆44Updated 11 months ago
- Tool to obtain hash using MS-SNTP for user accounts☆27Updated 9 months ago
- ☆25Updated 2 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆63Updated 8 months ago
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆25Updated last year
- Tool to aid in dumping LSASS process remotely☆41Updated last month
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated last year
- NailaoLoader: Hiding Execution Flow via Patching☆20Updated 7 months ago
- bring your own clean ntdll (or other MS dlls)☆27Updated 3 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated last year