whokilleddb / CVE-2022-26134-Confluence-RCE
Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection
☆11Updated 2 years ago
Alternatives and similar repositories for CVE-2022-26134-Confluence-RCE:
Users that are interested in CVE-2022-26134-Confluence-RCE are comparing it to the libraries listed below
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆50Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆39Updated 3 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- Active Directory certificate abuse.☆37Updated 3 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆63Updated 3 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 2 years ago
- Exploit for Microsoft SharePoint 2019☆14Updated last year
- Beacon Object Files.☆35Updated 11 months ago
- Windows Oracle Database Attack Toolkit☆81Updated 2 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆19Updated 9 months ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- ☆17Updated 3 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆45Updated 3 years ago
- ☆45Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆80Updated last year
- ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit☆47Updated 3 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- ☆17Updated 3 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆58Updated 2 years ago
- grafana 8.4.3 (b7d2911ca)☆29Updated 2 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆23Updated 2 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆13Updated 2 years ago
- Exploitation code for CVE-2021-40539☆45Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆50Updated 3 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Secretsdump C# version only supporting local (live) operation☆48Updated last year
- ☆21Updated 3 years ago
- ☆51Updated 2 years ago