mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
6.4 KiB
6.4 KiB
CVE-2021-34473
Description
Microsoft Exchange Server Remote Code Execution Vulnerability
POC
Reference
- http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html
Github
- https://github.com/0x3n0/redeam
- https://github.com/20142995/Goby
- https://github.com/20142995/nuclei-templates
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Advisory-Newsletter/Babuk-Ransomware
- https://github.com/ArtemCyberLab/Project-Lookback
- https://github.com/Astrogeorgeonethree/Starred
- https://github.com/Astrogeorgeonethree/Starred2
- https://github.com/Atem1988/Starred
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Dheerajmadhukar/karma_v2
- https://github.com/DiedB/caldera-precomp
- https://github.com/FDlucifer/Proxy-Attackchain
- https://github.com/GhostTroops/TOP
- https://github.com/HackingCost/AD_Pentest
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Himnish/Cyber-9-12
- https://github.com/JERRY123S/all-poc
- https://github.com/KNIGHTPROJEKS-0/LANCELOTT
- https://github.com/Ly4j/Exchange-ProxyShell-exp
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/NyxAzrael/Goby_POC
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/R1card0-tutu/Red
- https://github.com/RaouzRouik/CVE-2021-34473-scanner
- https://github.com/RomanRII/proxyshell2rce
- https://github.com/SYRTI/POC_to_review
- https://github.com/StarCrossPortal/scalpel
- https://github.com/T0mcat3r/ALinks
- https://github.com/Threekiii/Awesome-Redteam
- https://github.com/TreWilkinsRC/iis_parser
- https://github.com/Vluthor/Threat-Detection-SOC-Analysis
- https://github.com/W01fh4cker/Serein
- https://github.com/Wh1teHatUn1c0rn/RedOps-Framework
- https://github.com/WhooAmii/POC_to_review
- https://github.com/Z0fhack/Goby_POC
- https://github.com/anonymous364872/Rapier_Tool
- https://github.com/apif-review/APIF_tool_2024
- https://github.com/apit-review-account/apit-tool
- https://github.com/aravazhimdr/ProxyShell-POC-Mod
- https://github.com/but43r/ProxyShell
- https://github.com/c04ch1337/metasploit_docker
- https://github.com/c0mrade12211/Pentests
- https://github.com/certat/exchange-scans
- https://github.com/cryptoforcecommand/log4j-cve-2021-44228
- https://github.com/curated-intel/Log4Shell-IOCs
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/cyberheartmi9/Proxyshell-Scanner
- https://github.com/danyk20/pentest
- https://github.com/demining/Log4j-Vulnerability
- https://github.com/f4alireza/CVE
- https://github.com/gobysec/Goby
- https://github.com/hackingmess/HIVE-INDICADORES-DE-COMPROMISO-IOCs
- https://github.com/hktalent/TOP
- https://github.com/horizon3ai/proxyshell
- https://github.com/hosch3n/ProxyVulns
- https://github.com/huike007/penetration_poc
- https://github.com/huisetiankong478/penetration_poc
- https://github.com/ipsBruno/CVE-2021-34473-NMAP-SCANNER
- https://github.com/izj007/wechat
- https://github.com/jbmihoub/all-poc
- https://github.com/je6k/CVE-2021-34473-Exchange-ProxyShell
- https://github.com/jrgdiaz/ProxyShell-CVE-2021-34473.py
- https://github.com/kh4sh3i/ProxyShell
- https://github.com/kh4sh3i/exchange-penetration-testing
- https://github.com/koorchik/dissert
- https://github.com/koorchik/llm-analysis-of-text-data
- https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest
- https://github.com/learningsurface/ProxyShell-CVE-2021-34473.py
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/merlinepedra/RedTeam_toolkit
- https://github.com/merlinepedra25/RedTeam_toolkit
- https://github.com/mithridates1313/ProxyShell_POC
- https://github.com/n0-traces/cve_monitor
- https://github.com/nitish778191/fitness_app
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nullx3d/PaypScan
- https://github.com/osogi/NTO_2022
- https://github.com/p2-98/CVE-2021-34473
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/phamphuqui1998/CVE-2021-34473
- https://github.com/pondoksiber/Catatan_CVE
- https://github.com/psc4re/NSE-scripts
- https://github.com/pwnlog/ALinks
- https://github.com/pwnlog/PAD
- https://github.com/pwnlog/PuroAD
- https://github.com/pwnlog/PurpAD
- https://github.com/r0eXpeR/supplier
- https://github.com/rastidoust/Red
- https://github.com/rastidoust/rastidoust.github.io
- https://github.com/retr0-13/proxy_Attackchain
- https://github.com/sahar042/Shodan-IDOR
- https://github.com/sahar042/Shodan-IDOR-2
- https://github.com/shanyuhe/YesPoc
- https://github.com/shubhamrooter/ShodanSpider
- https://github.com/signorrayan/RedTeam_toolkit
- https://github.com/soosmile/POC
- https://github.com/superzerosec/poc-exploit-index
- https://github.com/swaptt/swapt-it
- https://github.com/trhacknon/Pocingit
- https://github.com/triw0lf/Security-Matters-22
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youcans896768/APIV_Tool
- https://github.com/zecool/cve