watchtowrlabs / Mitel-MiCollab-Auth-Bypass_CVE-2024-41713Links
☆16Updated 5 months ago
Alternatives and similar repositories for Mitel-MiCollab-Auth-Bypass_CVE-2024-41713
Users that are interested in Mitel-MiCollab-Auth-Bypass_CVE-2024-41713 are comparing it to the libraries listed below
Sorting:
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 7 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated last year
- Exploits Unauth Docker API☆41Updated last month
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- ☆25Updated 6 months ago
- ☆28Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Updated last year
- ☆35Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆28Updated last year
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- Keycloak admin API allows low privilege users to use administrative functions☆27Updated 7 months ago
- ☆28Updated last year
- ☆27Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- Red Team Server (RTS)☆16Updated last year
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆23Updated 5 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆24Updated 11 months ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 9 months ago
- ☆18Updated 6 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆37Updated 3 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 4 months ago
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 6 months ago