withdk / pulse-gosecure-rce-poc
Tool to test for existence of CVE-2020-8218
☆22Updated 4 years ago
Alternatives and similar repositories for pulse-gosecure-rce-poc:
Users that are interested in pulse-gosecure-rce-poc are comparing it to the libraries listed below
- Sound Research SECOMN service Privilege Escalation (windows 10)☆40Updated 5 years ago
- ☆71Updated 4 years ago
- ☆35Updated 2 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 3 years ago
- interesting analysis☆16Updated 6 years ago
- Leak windows system info through a docx file☆12Updated 5 years ago
- RCE in NPM VSCode Extension☆20Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 4 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 5 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- ☆19Updated 4 years ago
- Some talks about security☆13Updated 4 years ago
- CVE-2020-3452 exploit☆24Updated 4 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆49Updated 4 years ago
- CVE-2020–14882 by Jang☆29Updated 4 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Updated 6 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Updated 5 years ago
- CVE-2019-0230 Exploit POC☆15Updated 4 years ago
- PoC CVE-2020-6308☆35Updated 4 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Updated 7 years ago
- Lightweight C# windows agent for Apfell☆17Updated 5 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- ☆18Updated 3 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆45Updated 4 years ago