watchtowrlabs / Citrix-Virtual-Apps-XEN-ExploitLinks
Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE
☆194Updated 6 months ago
Alternatives and similar repositories for Citrix-Virtual-Apps-XEN-Exploit
Users that are interested in Citrix-Virtual-Apps-XEN-Exploit are comparing it to the libraries listed below
Sorting:
- ☆154Updated 10 months ago
- A Tool that aims to evade av with binary padding☆151Updated 11 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆149Updated 8 months ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆101Updated 10 months ago
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆239Updated 11 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆141Updated 4 months ago
- ☆136Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆96Updated last month
- ☆226Updated last year
- Heavily obfuscated ASP web shell generation tool.☆164Updated last year
- Fileless atexec, no more need for port 445☆384Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆205Updated last year
- PoCs of RCEs against open source C2 servers☆81Updated 8 months ago
- ☆164Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆126Updated last week
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆86Updated 6 months ago
- AdaptixFramework Extension Kit☆126Updated last week
- Cobalt Strike BOF for evasive .NET assembly execution☆249Updated 2 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆254Updated 9 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆200Updated 7 months ago
- Active Directory Authentication Library☆73Updated 3 weeks ago
- Stage 0☆160Updated 5 months ago
- ☆66Updated 4 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆139Updated 2 months ago
- RCE exploit for CVE-2023-3519☆224Updated last year
- Port of Cobalt Strike's Process Inject Kit☆178Updated 6 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆206Updated last year
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆46Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆302Updated 6 months ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆209Updated last year