watchtowrlabs / Citrix-Virtual-Apps-XEN-ExploitLinks
Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE
☆200Updated last year
Alternatives and similar repositories for Citrix-Virtual-Apps-XEN-Exploit
Users that are interested in Citrix-Virtual-Apps-XEN-Exploit are comparing it to the libraries listed below
Sorting:
- ☆158Updated last year
- Deserialization payload generator for a variety of .NET formatters☆176Updated 2 months ago
- WSUS Unauthenticated RCE☆169Updated 3 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆153Updated last year
- FortiWeb CVE-2025-25257 exploit☆63Updated 6 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆234Updated 2 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆224Updated 2 years ago
- PoCs of RCEs against open source C2 servers☆91Updated last year
- A Tool that aims to evade av with binary padding☆160Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆249Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆106Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆176Updated 3 weeks ago
- ☆137Updated 2 years ago
- ☆241Updated last year
- ☆222Updated last year
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- ☆168Updated 2 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- SharePoint WebPart Injection Exploit Tool☆311Updated 2 months ago
- ☆68Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆121Updated 7 months ago
- Extract SAM and SYSTEM using Volume Shadow Copy (VSS) API. With multiple exfiltration options and XOR obfuscation☆331Updated 3 weeks ago
- Homemade Aggressor scripts kit for Cobalt Strike☆92Updated 2 months ago
- Active Directory Authentication Library☆87Updated 2 months ago
- ☆262Updated 6 months ago
- Fileless atexec, no more need for port 445☆404Updated last year