mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 18:52:12 +00:00
105 lines
6.8 KiB
Markdown
105 lines
6.8 KiB
Markdown
![]() |
### [CVE-2021-26857](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26857)
|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Microsoft Exchange Server Remote Code Execution Vulnerability
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/00011100/HAFHunt
|
||
|
- https://github.com/20142995/sectool
|
||
|
- https://github.com/34zY/APT-Backpack
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Ahsanzia/Exchange-Exploit
|
||
|
- https://github.com/Astrogeorgeonethree/Starred
|
||
|
- https://github.com/Astrogeorgeonethree/Starred2
|
||
|
- https://github.com/Atem1988/Starred
|
||
|
- https://github.com/BC-SECURITY/Moriarty
|
||
|
- https://github.com/CVEDB/PoC-List
|
||
|
- https://github.com/CVEDB/awesome-cve-repo
|
||
|
- https://github.com/CVEDB/top
|
||
|
- https://github.com/DCScoder/Exchange_IOC_Hunter
|
||
|
- https://github.com/GhostTroops/TOP
|
||
|
- https://github.com/Immersive-Labs-Sec/ProxyLogon
|
||
|
- https://github.com/JERRY123S/all-poc
|
||
|
- https://github.com/Mr-xn/Penetration_Testing_POC
|
||
|
- https://github.com/NTUTtopicBryan/NTUT_HomeWork
|
||
|
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
||
|
- https://github.com/Ostorlab/KEV
|
||
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||
|
- https://github.com/SCS-Labs/HAFNIUM-Microsoft-Exchange-0day
|
||
|
- https://github.com/SYRTI/POC_to_review
|
||
|
- https://github.com/Seeps/shellcollector
|
||
|
- https://github.com/SohelParashar/.Net-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/SpearTip-Cyber-Counterintelligence/Zirconium
|
||
|
- https://github.com/WhooAmii/POC_to_review
|
||
|
- https://github.com/WiredPulse/Invoke-HAFNIUMCheck.ps1
|
||
|
- https://github.com/Yt1g3r/CVE-2021-26855_SSRF
|
||
|
- https://github.com/bhassani/Recent-CVE
|
||
|
- https://github.com/byinarie/Zirconium
|
||
|
- https://github.com/cert-lv/exchange_webshell_detection
|
||
|
- https://github.com/cryptolakk/ProxyLogon-Mass-RCE
|
||
|
- https://github.com/cyberanand1337x/bug-bounty-2022
|
||
|
- https://github.com/cyware-labs/Operation-Exchange-Marauder
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/doris0213/Proxy-Logon
|
||
|
- https://github.com/herwonowr/exprolog
|
||
|
- https://github.com/hktalent/TOP
|
||
|
- https://github.com/huike007/penetration_poc
|
||
|
- https://github.com/jbmihoub/all-poc
|
||
|
- https://github.com/k0mi-tg/CVE-POC
|
||
|
- https://github.com/kh4sh3i/exchange-penetration-testing
|
||
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||
|
- https://github.com/manas3c/CVE-POC
|
||
|
- https://github.com/mysticwayfarer1/Exchange-HAFNIUM
|
||
|
- https://github.com/netlas-io/MsExchangeServerVersionCheck
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/sgnls/exchange-0days-202103
|
||
|
- https://github.com/sirpedrotavares/Proxylogon-exploit
|
||
|
- https://github.com/soosmile/POC
|
||
|
- https://github.com/soteria-security/HAFNIUM-IOC
|
||
|
- https://github.com/trhacknon/Pocingit
|
||
|
- https://github.com/vehemont/nvdlib
|
||
|
- https://github.com/weeka10/-hktalent-TOP
|
||
|
- https://github.com/whoforget/CVE-POC
|
||
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||
|
- https://github.com/youwizard/CVE-POC
|
||
|
- https://github.com/zecool/cve
|
||
|
|