Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-26855 PoC — Microsoft Exchange Server Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-26855)
Description:Microsoft Exchange Server Remote Code Execution Vulnerability
Description
RCE exploit for Microsoft Exchange Server (CVE-2021-26855).
Readme
# proxylogon
my exploit for the proxylogon chain (Microsoft Exchange Server - CVE-2021-26855)   
# Run:
the exploit uses Impacket package, to install it run this:
```
user@host:~$ python3 -m pip install impacket
```
then clone the exploit repo, and enter the exploit directory:
```
user@host:~$ git clone https://github.com/hakivvi/proxylogon.git && cd proxylogon
```
run the exploit:
```
user@host:~$ python3 proxylogon.py http://mail.corp.com email@corp.com
```
File Snapshot

[4.0K] /data/pocs/7eeae36e97f18b77c4bdadb4642a45e90f281930 ├── [ 55K] PoC.jpg ├── [ 16K] proxylogon.py └── [ 464] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →