xaitax / CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-VulnerabilityLinks
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
☆756Updated last year
Alternatives and similar repositories for CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Users that are interested in CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability are comparing it to the libraries listed below
Sorting:
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆513Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆810Updated 10 months ago
- Dominate Active Directory with PowerShell.☆1,154Updated 2 months ago
- Windows Local Privilege Escalation Cookbook☆1,256Updated last year
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques and used by Patchwork group.☆834Updated last year
- Awesome EDR Bypass Resources For Ethical Hacking☆1,459Updated last week
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆780Updated last year
- CVE-2023-38831 winrar exploit generator☆787Updated 2 years ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆429Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆1,004Updated 3 weeks ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆999Updated 2 weeks ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,060Updated 6 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,806Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,396Updated last week
- ☆714Updated last year
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆640Updated 9 months ago
- Script for generating revshells☆479Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Updated 2 years ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆742Updated 8 months ago
- Complete list of LPE exploits for Windows (starting from 2023)☆904Updated last week
- Red team Interview Questions☆729Updated 9 months ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆550Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆535Updated 2 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆390Updated 10 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆456Updated last year
- PoC for CVE-2023-4911☆388Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆933Updated 3 years ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,284Updated 7 months ago
- PoC Exploit for the NTLM reflection SMB flaw.☆665Updated last week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆667Updated 3 months ago