mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-28 01:04:30 +00:00
4.0 KiB
4.0 KiB
CVE-2018-8581
Description
An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka "Microsoft Exchange Server Elevation of Privilege Vulnerability." This affects Microsoft Exchange Server.
POC
Reference
No PoCs from references.
Github
- https://github.com/0xT11/CVE-POC
- https://github.com/1o24er/RedTeam
- https://github.com/20142995/sectool
- https://github.com/404notf0und/Security-Data-Analysis-and-Visualization
- https://github.com/61106960/adPEAS
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/Red-Team
- https://github.com/Apri1y/Red-Team-links
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CYJoe-Cyclone/Awesome-CobaltStrike
- https://github.com/Echocipher/Resource-list
- https://github.com/ErdemOzgen/ActiveDirectoryAttacks
- https://github.com/FDlucifer/Proxy-Attackchain
- https://github.com/GhostTroops/TOP
- https://github.com/HackingCost/AD_Pentest
- https://github.com/JERRY123S/all-poc
- https://github.com/Nieuport/Active-Directory-Kill-Chain-Attack-Defense
- https://github.com/Ondrik8/RED-Team
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/R0B1NL1N/AD-Attack-Defense
- https://github.com/Ridter/Exchange2domain
- https://github.com/SycloverSecurity/http_ntlmrelayx
- https://github.com/Whiteh4tWolf/Attack-Defense
- https://github.com/WyAtu/CVE-2018-8581
- https://github.com/ZyberPatrol/Active-Directory
- https://github.com/aymankhder/AD-attack-defense
- https://github.com/bhataasim1/AD-Attack-Defence
- https://github.com/cetriext/fireeye_cves
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/diyarit/Ad-Peas
- https://github.com/dk47os3r/hongduiziliao
- https://github.com/fei9747/Awesome-CobaltStrike
- https://github.com/geeksniper/active-directory-pentest
- https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense-
- https://github.com/hangchuanin/Intranet_penetration_history
- https://github.com/hasee2018/Safety-net-information
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/hudunkey/Red-Team-links
- https://github.com/infosecn1nja/AD-Attack-Defense
- https://github.com/jbmihoub/all-poc
- https://github.com/john-80/-007
- https://github.com/landscape2024/RedTeam
- https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest
- https://github.com/lp008/Hack-readme
- https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense
- https://github.com/nadeemali79/AD-Attack-Defense
- https://github.com/nobiusmallyu/kehai
- https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document
- https://github.com/paramint/AD-Attack-Defense
- https://github.com/phackt/Invoke-Recon
- https://github.com/qiantu88/CVE-2018-8581
- https://github.com/retr0-13/AD-Attack-Defense
- https://github.com/shantanu561993/DomainUserToDomainAdminTechniques
- https://github.com/slimdaddy/RedTeam
- https://github.com/sunzu94/AD-Attack-Defense
- https://github.com/superfish9/pt
- https://github.com/svbjdbk123/-
- https://github.com/tataev/Security
- https://github.com/tom0li/collection-document
- https://github.com/twensoo/PersistentThreat
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whitfieldsdad/epss
- https://github.com/xiaoZ-hc/redtool
- https://github.com/yut0u/RedTeam-BlackBox
- https://github.com/zer0yu/Awesome-CobaltStrike
- https://github.com/zer0yu/Intranet_Penetration_CheetSheets
- https://github.com/zer0yu/RedTeam_CheetSheets
- https://github.com/zoreforlugcoiz/Devhoster