xzajyjs / CVE-2022-39197-POCLinks
CVE-2022-39197(CobaltStrike XSS <=4.7) POC
☆47Updated 2 years ago
Alternatives and similar repositories for CVE-2022-39197-POC
Users that are interested in CVE-2022-39197-POC are comparing it to the libraries listed below
Sorting:
- ☆47Updated 3 years ago
- CVE-2022-33980 Apache Commons Configuration 远程命令执行漏洞☆41Updated 3 years ago
- NoPacScan is a CVE-2021-42287/CVE-2021-42278 Scanner,it scan for more domain controllers than other script☆90Updated 3 years ago
- Tools developed during the personal learning process☆23Updated 3 years ago
- YApi boolean-based injection exploit.☆58Updated 2 years ago
- 连接eval一句话webshell,获得可交互的虚拟终端☆97Updated 2 years ago
- detect gitlab detail version☆54Updated last year
- 🗽 基于Socket RAW,利用 NTLMSSP 探测 Windows远程主机信息☆50Updated 2 years ago
- ☆93Updated 2 years ago
- CobaltStrike and Google Auth twice☆64Updated 3 years ago
- ☆102Updated 2 years ago
- NOPEN Tool 又名“morerats” 莫雷斯特,是方程式工具包里的工具。☆46Updated 3 years ago
- 密码收集☆58Updated 3 years ago
- portreuse reuseport 端口复用☆62Updated 2 years ago
- Powershell 免杀脚本☆50Updated 2 years ago
- ad vulnerability scanner☆72Updated last year
- CVE-2023-36899漏洞的复现环境和工具,针对ASP.NET框架中的无cookie会话身份验证绕过。☆31Updated 2 years ago
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆44Updated 2 years ago
- 窃取当前用户的ssh,sudo密码☆69Updated 2 years ago
- 后台插件getshell☆50Updated 3 years ago
- CNVD-2023-27598☆18Updated 2 years ago
- ☆95Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆69Updated 2 years ago
- cve-2022-23131 exp☆93Updated 3 years ago
- 根据攻防以及域信息收集经验dump快而有用的域信息☆103Updated 2 years ago
- cve-2022-39197 poc☆73Updated 2 years ago
- Backdoor&后渗透工具☆21Updated 4 years ago
- cobaltstrike免杀插件☆23Updated 3 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- webshell manager libraries | 网站管理工具☆133Updated 3 years ago