xaitax / CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-VulnerabilityView external linksLinks
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
☆758Feb 19, 2024Updated last year
Alternatives and similar repositories for CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Users that are interested in CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability are comparing it to the libraries listed below
Sorting:
- UAC Bypass By Abusing Kerberos Tickets☆508Aug 10, 2023Updated 2 years ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆635May 8, 2025Updated 9 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆235Sep 26, 2023Updated 2 years ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆813Mar 28, 2025Updated 10 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆621Jun 25, 2024Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆603Feb 21, 2024Updated last year
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆585Mar 19, 2024Updated last year
- ☆2,182Nov 24, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆432Dec 21, 2023Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Feb 17, 2024Updated last year
- Fileless atexec, no more need for port 445☆404Mar 28, 2024Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,813Nov 3, 2024Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- New generation of wmiexec.py☆1,255Jan 5, 2026Updated last month
- ☆158Jul 10, 2024Updated last year
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆539Feb 13, 2024Updated 2 years ago
- ☆705Nov 7, 2023Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆522Nov 18, 2025Updated 2 months ago
- RCE exploit for CVE-2023-3519☆229Aug 23, 2023Updated 2 years ago
- ☆242May 5, 2024Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆224Nov 23, 2023Updated 2 years ago
- HVNC for Cobalt Strike☆1,297Dec 7, 2023Updated 2 years ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Aug 13, 2024Updated last year
- Windows Local Privilege Escalation Cookbook☆1,266Feb 5, 2026Updated last week
- ☆168Oct 29, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,364Oct 27, 2023Updated 2 years ago
- Dominate Active Directory with PowerShell.☆1,162Nov 28, 2025Updated 2 months ago
- CVE-2024-23897☆202Jan 28, 2024Updated 2 years ago
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆381Apr 26, 2025Updated 9 months ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆300Feb 2, 2026Updated 2 weeks ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆358Dec 13, 2025Updated 2 months ago
- ☆378Oct 17, 2025Updated 3 months ago
- ☆137Jan 14, 2024Updated 2 years ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆687Aug 27, 2024Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆200Nov 12, 2024Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆772Jan 26, 2026Updated 3 weeks ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 4 months ago