watchtowrlabs / watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882Links
☆46Updated last month
Alternatives and similar repositories for watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882
Users that are interested in watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882 are comparing it to the libraries listed below
Sorting:
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 3 years ago
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆57Updated 2 years ago
- some sploits☆18Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- ☆81Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆59Updated this week
- ☆63Updated last year
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- Java archive implant toolkit.☆61Updated 6 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- A LAPS dumper written using the impacket library.☆32Updated 2 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Updated 2 years ago
- Office 365 and Exchange Enumeration Version 2☆18Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- ☆27Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆15Updated last year
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated last year
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Updated 10 months ago
- PoC☆12Updated 7 months ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 3 years ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆29Updated 9 months ago
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆28Updated last month
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated last year
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆22Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆60Updated 4 months ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Updated 11 months ago