add 部分Windows+Linux提权漏洞

SpringBoot Actuator未授权自动化利用、CrackMapExec:一款针对大型Windows活动目录(AD)的后渗透工具、用C# 实现的dump lsass 进程工具、Kerberos中继框架
This commit is contained in:
Mrxn 2022-06-21 22:35:02 +08:00
parent bab9aaab02
commit 3e0418c612

View File

@ -303,8 +303,8 @@
- [【Windows提权】Priv2Admin-Windows提权工具](https://github.com/gtworek/Priv2Admin)
- [【windows提权】利用有漏洞的技嘉驱动程序来加载恶意的驱动程序提升权限或干掉驱动级保护的杀软](https://github.com/alxbrn/gdrv-loader)|[备份地址](https://github.com/Mr-xn/gdrv-loader)
- [【windows提权】byeintegrity-uac通过劫持位于本机映像缓存中的DLL绕过UAC](https://github.com/AzAgarampur/byeintegrity-uac)
- [【Windows 提】InstallerFileTakeOverWindows Installer 本地提权漏洞PoC](https://github.com/klinix5/InstallerFileTakeOver)
- [【Linux 提权】CVE-2021-4034Linux Polkit 权限提升漏洞pkexec](https://github.com/berdav/CVE-2021-4034)|[PwnKitcve-2021-4034](https://github.com/ly4k/PwnKit)
- [【Windows 提】InstallerFileTakeOverWindows Installer 本地提权漏洞PoC](https://github.com/klinix5/InstallerFileTakeOver)
- [【Linux 提权】CVE-2021-4034Linux Polkit 权限提升漏洞pkexec](https://github.com/berdav/CVE-2021-4034)|[PwnKitcve-2021-4034](https://github.com/ly4k/PwnKit)|[cve-2021-4034单命令执行版本](https://github.com/wudicainiao/cve-2021-4034)
- [【Windows 提权】CVE-2022-21882win32k LPE bypass CVE-2021-1732](https://github.com/KaLendsi/CVE-2022-21882)
- [【Windows 提权】CVE-2022-21999Windows 打印机提权漏洞此漏洞是去年打印机提权漏洞Printnightmare的续集](https://github.com/ly4k/SpoolFool)
- [【Windows 提权】CVE-2022-290727-Zip帮助页面命令注入漏洞](https://github.com/kagancapar/CVE-2022-29072)
@ -426,13 +426,13 @@
- [CVE-2021-40444Windows MSHTML 0day漏洞](https://github.com/lockedbyte/CVE-2021-40444)
- [PrintNightmareCVE-2021-1675 / CVE-2021-34527 exploit](https://github.com/outflanknl/PrintNightmare)
- [PrintNightmareCVE-2021-1675 / CVE-2021-34527 exploit](https://github.com/outflanknl/PrintNightmare)|[CVE-2021-1675的 PowerShell 版本](https://github.com/calebstewart/CVE-2021-1675)|[CVE-2021-1675Impacket实现的py 脚本](https://github.com/cube0x0/CVE-2021-1675)
- [CVE-2021-40444MSHTML代码执行漏洞 RCE](https://github.com/lockedbyte/CVE-2021-40444)
- [CVE-2021-37980Google Chrome 沙箱漏洞 POC](https://github.com/ZeusBox/CVE-2021-37980)
- [CVE-2021-40449 EXP about windows 10 14393 LPE](https://github.com/KaLendsi/CVE-2021-40449-Exploit)
- [【Windows 提权】CVE-2021-40449 EXP about windows 10 14393 LPE](https://github.com/KaLendsi/CVE-2021-40449-Exploit)|[CallbackHellCVE-2021-40449 Win32k提权漏洞](https://github.com/ly4k/CallbackHell)
- [CVE-2021-22005VMware vCenter Server任意文件上传漏洞](https://github.com/r0ckysec/CVE-2021-22005)|[又一个 cve-2021-22005利用工具仅支持 Linux 版本的vCenter](https://github.com/shmilylty/cve-2021-22005-exp)
@ -442,7 +442,7 @@
- [VMware_vCenterVMware vCenter版本小于7.0.2.00100的未授权任意文件读取+SSRF+XSS](https://github.com/l0ggg/VMware_vCenter)
- [noPacCVE-2021-42287/CVE-2021-42278 Scanner & ExploiterMicrosoft Windows Active Directory 权限许可和访问控制问题漏洞)](https://github.com/cube0x0/noPac)|[Python 版本noPac](https://github.com/Ridter/noPac)|[NoPacScan又一个 Python 的CVE-2021-42287/CVE-2021-42278扫描工具](https://github.com/knightswd/NoPacScan)
- [noPacCVE-2021-42287/CVE-2021-42278 Scanner & ExploiterMicrosoft Windows Active Directory 权限许可和访问控制问题漏洞)](https://github.com/cube0x0/noPac)|[Python 版本noPac](https://github.com/Ridter/noPac)|[NoPacScan又一个 Python 的CVE-2021-42287/CVE-2021-42278扫描工具](https://github.com/knightswd/NoPacScan)|[CVE-2022-21907DOS 攻击脚本](https://github.com/polakow/CVE-2022-21907)|[PachineCVE-2021-42278的Python 版本实现](https://github.com/ly4k/Pachine)
- [CVE-2022-21907](https://github.com/nu11secur1ty/Windows10Exploits/tree/master/2022/CVE-2022-21907)|[CVE-2022-21907Windows HTTP协议栈远程代码执行漏洞有待验证](https://github.com/antx-code/CVE-2022-21907)|[PowerShell 版本CVE-2022-21907Windows HTTP协议栈远程代码执行漏洞检查工具](https://github.com/mauricelambert/CVE-2022-21907)
@ -478,6 +478,10 @@
- [CVE-2022-30190Microsoft Office Word Rce ](https://github.com/bytecaps/CVE-2022-30190)|[CVE-2022-30190](https://github.com/JMousqueton/PoC-CVE-2022-30190)|[follina.pyCVE-2022-30190 检测工具](https://github.com/chvancooten/follina.py)|[CVE-2022-30190又一个](https://github.com/onecloudemoji/CVE-2022-30190)|[CVE-2022-30190-follina-Office-MSDT-Fixed可以自定义word模板](https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed)
- [【Windows 提权】CVE-2021-31956-EXPWindows 内核堆栈溢出漏洞利用工具](https://github.com/aazhuliang/CVE-2021-31956-EXP)
- [【Linux 提权】vault_range_pocCVE-2021-26708 四字节写特殊竞争UAF转化为内核任意读写漏洞](https://github.com/hardenedvault/vault_range_poc)
## <span id="head7"> tools-小工具集版本合</span>
- [java环境下任意文件下载情况自动化读取源码的小工具](https://github.com/Artemis1029/Java_xmlhack)
@ -1148,7 +1152,7 @@
- [eyes.sh基于bugscan dnslog 优化版](https://github.com/lijiejie/eyes.sh)
- [CVE-2022-22965-POCCVE-2022-22965 spring-core批量检测脚本](https://github.com/chaosec2021/CVE-2022-22965-POC)|[漏洞环境tomcat 的 war 包](https://github.com/fengguangbin/spring-rce-war)|[漏洞环境docker 版](https://github.com/lunasec-io/Spring4Shell-POC)|[支持注入冰蝎内存马和解决持续追加问题](https://github.com/liangyueliangyue/spring-core-rce)
- [ConPtyShell适用于 Windows 的反弹互式 shell工具](https://github.com/antonioCoco/ConPtyShell)
- [RemotePotato0Windows 提工具,从普通用户提前至域管理员](https://github.com/antonioCoco/RemotePotato0)
- [RemotePotato0Windows 提工具,从普通用户提前至域管理员](https://github.com/antonioCoco/RemotePotato0)
- [jfscanmasscan和 nmap 联合的端口扫描脚本](https://github.com/nullt3r/jfscan)
- [NativePayload_CBT通过回调函数加载代码执行](https://github.com/DamonMohammadbagher/NativePayload_CBT)
- [RPCDump通过RP来 dump 信息](https://github.com/csandker/RPCDump)
@ -1293,6 +1297,12 @@
- [ysoserial魔改版ysoserial支持更多更全的利用链+内存马+防御绕过+MSF/CS 上线](https://github.com/su18/ysoserial)
- [PowerRunAsSystem通过已有 system 权限进程来启动一个新的以 system 权限运行的 PowerShell 脚本](https://github.com/DarkCoderSc/PowerRunAsSystem)
- [Ekko一种使用 CreateTimerQueueTimer 将执行 Sleep 混淆的 ROP 链排队的小型 sleep 混淆技术](https://github.com/Cracked5pider/Ekko)
- [bypassuac](https://github.com/liuxigu/bypassuac)
- [ActuatorExploitSpringBoot Actuator未授权自动化利用支持信息泄漏/RCE](https://github.com/LFYSec/ActuatorExploit)
- [SharpMapExecCrackMapExec的C#实现版本](https://github.com/cube0x0/SharpMapExec)|[CrackMapExec一款针对大型Windows活动目录(AD)的后渗透工具](https://github.com/byt3bl33d3r/CrackMapExec)
- [MiniDump用C# 实现的dump lsass 进程工具](https://github.com/cube0x0/MiniDump)
- [KrbRelayKerberos中继框架](https://github.com/cube0x0/KrbRelay)
- [CurveBallCVE-2020-0601 ECC证书欺骗漏洞利用工具](https://github.com/ly4k/CurveBall)
## <span id="head8"> 文章/书籍/教程相关</span>