Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)
-
Updated
Dec 7, 2023 - C#
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)
Escalate as Administrator bypassing the UAC affecting administrator accounts only.
Eternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010
This repository is a tool to create a .suo that when run by visual studio's will achieve code execution
Plaintext Password harvesting from Azure Windows VMs
Xbox One Symbolic Link Exploit: Access restricted/encrypted volumes using the Xbox File Explorer.
A post-exploitation tool to decrypt SolarPutty's sessions files
Ivan Ricart Borges - Test for didactic purposes of web pages vulnerables to SQL injection using dbo database user with xp_cmdshell execution permissions. Using patterns from Internet search engines to extract potentially vulnerable web addresses and test them by changing the GET parameters using invalid Transact-SQL conversion function to cause …
A level 7 keyless Lua executor for Roblox. Free, forever!
GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)
RArAtikTdkA is a modern, c#-based malware with great undetectable techniques
👹 Fixes known BinaryFormatter deserialization vulnerabilities
Keylogger builder written in C#
An advanced tool for bypassing EDR (Endpoint Detection and Response) systems and antivirus software by dynamically generating and injecting shellcode
Exploiting TOCTOU vulnerability using OpLock and Junctions
Power up your Pummel Party experience with this customizable cheat, built for friendly competition or solo practice.
🔧 The program that allows you to grab certain info about the victim
Created by The cybersecurity community