xzajyjs / CVE-2022-39197-POC
CVE-2022-39197(CobaltStrike XSS <=4.7) POC
☆48Updated 2 years ago
Alternatives and similar repositories for CVE-2022-39197-POC:
Users that are interested in CVE-2022-39197-POC are comparing it to the libraries listed below
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆79Updated 2 years ago
- ☆101Updated 2 years ago
- 密码收集☆58Updated 2 years ago
- Tools developed during the personal learning process☆22Updated 3 years ago
- ad vulnerability scanner☆70Updated last year
- CobaltStrike Malleable Profile☆23Updated 2 years ago
- portreuse reuseport 端口复用☆61Updated last year
- NoPacScan is a CVE-2021-42287/CVE-2021-42278 Scanner,it scan for more domain controllers than other script☆86Updated 3 years ago
- ☆88Updated 2 years ago
- Zerologon自动化脚本☆88Updated last year
- CVE-2022-33980 Apache Commons Configuration 远程命令执行漏洞☆40Updated 2 years ago
- 根据攻防以及域信息收集经验dump快而有用的域信息☆105Updated last year
- 伪造cs上线流量,实现cs批量上线,欺骗防御☆35Updated 2 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆148Updated 2 years ago
- Zerologon exploit with restore DC password automatically☆133Updated 11 months ago
- The Poc for CVE-2024-20931☆72Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆69Updated 2 years ago
- If you only have hash, you can still operate exchange☆71Updated 3 years ago
- ☆33Updated last year
- 🗽 基于Socket RAW,利用 NTLMSSP 探测 Windows远程主机信息☆50Updated last year
- CVE-2020-1472 C++