watchtowrlabs / watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882Links
☆42Updated 2 weeks ago
Alternatives and similar repositories for watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882
Users that are interested in watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882 are comparing it to the libraries listed below
Sorting:
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 3 years ago
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆57Updated 2 years ago
- ☆63Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- PoC☆12Updated 6 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated last year
- A LAPS dumper written using the impacket library.☆32Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated last year
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 3 years ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Updated 10 months ago
- ☆81Updated last year
- Tools for Attacking Pleasant Password Server☆22Updated 2 years ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Updated 11 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆115Updated last year
- ☆31Updated 3 years ago
- some sploits☆18Updated last year
- Java archive implant toolkit.☆61Updated 6 months ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆26Updated last month
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- Tool to start processes as SYSTEM using token duplication☆38Updated 5 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆79Updated 3 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- Office 365 and Exchange Enumeration Version 2☆18Updated last year
- PoC-Malware-TTPs☆49Updated 2 years ago
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆22Updated last year