vonahisec / CVE-2022-47966-ScanLinks
Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.
☆27Updated 2 years ago
Alternatives and similar repositories for CVE-2022-47966-Scan
Users that are interested in CVE-2022-47966-Scan are comparing it to the libraries listed below
Sorting:
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- Retrieve AD accounts description and search for password in it☆83Updated 3 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆37Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆84Updated last year
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆27Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆95Updated 4 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆80Updated 3 years ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆84Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- ☆52Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- RDP Checker☆63Updated last year
- ☆54Updated 8 months ago
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated 2 years ago
- PoC-Malware-TTPs☆49Updated 2 years ago
- ☆14Updated 3 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆114Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- ☆43Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Updated last year
- ☆18Updated 2 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Windows 权限提升 BadPotato☆13Updated 4 years ago
- ☆31Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 4 years ago