websecnl / CVE-2022-26809Links
Remote Code Execution Exploit in the RPC Library
☆28Updated 3 years ago
Alternatives and similar repositories for CVE-2022-26809
Users that are interested in CVE-2022-26809 are comparing it to the libraries listed below
Sorting:
- CrossC2 developed based on the Cobalt Strike framework can be used for other cross-platform system control. CrossC2Kit provides some inte…☆223Updated last year
- PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers☆94Updated 2 years ago
- Take a screenshot without injection for Cobalt Strike☆197Updated 2 years ago
- CobaltStrike 4.0 - 4.5 Patch☆178Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆89Updated 2 years ago
- ☆101Updated 2 years ago
- Implement load Cobalt Strike & Metasploit&Sliver shellcode with golang☆126Updated 2 years ago
- 👻Stowaway -- Multi-hop Proxy Tool for pentesters☆119Updated 3 years ago
- Go implementation of the self-deletion of an running executable from disk☆113Updated 2 years ago
- POC for RCE using vulnerabilities described in VMSA-2023-0001☆149Updated 2 years ago
- Shellcode Reductio Entropy Tools☆71Updated last year
- Cobalt Strike AggressorScripts For Red Team☆154Updated 4 years ago
- Some Attacks of Exchange SSRF ProxyLogon&ProxyShell☆166Updated 3 years ago
- Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软☆54Updated 3 years ago
- Java JNI HellsGate/HalosGate/TartarusGate/RecycledGate/SSN Syscall/Many Shellcode Loaders☆196Updated 2 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆278Updated 2 years ago
- ☆55Updated last year
- HackBrowserData的反射模块☆175Updated 4 years ago
- the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An aut…☆34Updated 2 years ago
- cs手机版的源码,此处不放源jar包,自行添加编译☆54Updated 2 years ago
- The poc for CVE-2022-26809 RCE via RPC will be updated here.☆20Updated 3 years ago
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆161Updated 2 years ago
- ☆47Updated 3 years ago
- about thinkphp lang RCE QVD-2022-46174 v6.0.1 <= Thinkphp <= v6.0.13 Thinkphp v5.0.x Thinkphp v5.1.x☆41Updated 2 years ago
- If you only have hash, you can still operate exchange☆75Updated 3 years ago
- This is a third party agent for Havoc C2 written in golang.☆58Updated last year
- CobaltStrike and Google Auth twice☆65Updated 3 years ago
- CobaltStrike Malleable Profile☆23Updated 3 years ago
- Zerologon exploit with restore DC password automatically☆139Updated last year
- nim,免杀,红队,shellcode,bypass,apt,bypass-av.☆203Updated 2 years ago