Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-26855 PoC — Microsoft Exchange Server Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-26855)
Description:Microsoft Exchange Server Remote Code Execution Vulnerability
Readme
# CVE-2021-26855 exploit-Exchange
# Auto Scan the World and auto exploit rce
# By EOG Team
File Snapshot

[4.0K] /data/pocs/d70d56fbc076cc1662fa91d9173a84dcc8546cb9 ├── [ 710] cmder.py ├── [274K] cmd.exe ├── [ 14K] CVE-2021-26855.go ├── [7.2K] CVE-2021-26855.py ├── [ 0] massproxylogon.log ├── [4.0K] opcobaltstrike(MASS) │   ├── [274K] cmd.exe │   ├── [ 480] dochuongdan.txt │   ├── [ 694] mass │   ├── [1.2K] ntauthority.py │   ├── [ 27] oabsuccess.log │   ├── [ 13K] proxylogon.py │   ├── [ 27] proxylogonsuccess.log │   ├── [ 110] shell.log │   └── [5.1K] user.txt ├── [ 831] payload.yml ├── [7.3K] PoC_proxyLogon.py ├── [371K] proxylogon.docx ├── [ 13K] proxylogonFULL.py ├── [7.7K] proxylogon.py ├── [ 91] README.md ├── [ 14K] script.py ├── [ 104] shell.log ├── [ 212] shell.txt ├── [1.2K] ssrf.py ├── [ 12K] test.py └── [5.2K] users.txt 1 directory, 26 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →