xIntHunterx's starred repositories
eop24-26229
A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a privileged user
CVE-2024-41958-PoC
This is a small proof of concept for CVE-2024-41958
CVE-2024-7339
An Vulnerability detection and Exploitation tool for CVE-2024-7339
LeakedWallpaper
Leak of any user's NetNTLM hash. Fixed in KB5040434
chamilo-lms
Chamilo is a learning management system focused on ease of use and accessibility
CVE-2024-21338
Windows AppLocker Driver (appid.sys) LPE
smbtakeover
BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions
CVE-2024-39929
POC to test CVE-2024-39929 against EXIM mail servers
Hellshazzard
Indirect Syscall implementation to bypass userland NTAPIs hooking.
.NET_PROFILER_DLL_LOADING
.NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit is loading a malicious DLL using Task Scheduler (MMC) to bypass UAC and getting admin privileges.
pdfdropper
PDF dropper Red Team Scenairos
CVE-2024-41107
This repository contains an PoC for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack
CVE-2024-40725-CVE-2024-40898
CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.
CVE-2024-40348
POC for CVE-2024-40348. Will attempt to read /etc/passwd from target
CVE-2024-33352
BlueStacks privilege escalation through VM backdooring
CVE-2024-22274-RCE
PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)
c-CVE-2024-0044
CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo "executar como qualquer aplicativo" que afeta as versões 12 e 13 do Android
Docker-API-Remote-Root-Shell-Exploit
A Simple Python Program that uses Docker Module to communicate with Docker API and gets a Remote Root Shell on the Target Device