nomisec
WORKING POC
759 stars
by xaitax · client-side
https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
This repository contains a functional PoC for CVE-2024-21413, a Microsoft Outlook RCE vulnerability. The script crafts a malicious email with a base64-encoded image and a file:// URI link, exploiting Outlook's handling of such links to achieve remote code execution.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2024-21413)
Auth required
Prerequisites:
SMTP server access · Valid SMTP credentials · Target email address
nomisec
WORKING POC
217 stars
by CMNatic · client-side
https://github.com/CMNatic/CVE-2024-21413
This repository contains a functional Python exploit for CVE-2024-21413 (MonikerLink), which abuses Microsoft Outlook's handling of 'file://' URIs to achieve remote code execution. The exploit sends a crafted email with a malicious link that triggers SMB/NTLM authentication requests to an attacker-controlled server.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2024-21413)
Auth required
Prerequisites:
Access to an SMTP server · Victim interaction (email click) · Attacker-controlled SMB/NTLM relay server
nomisec
WORKING POC
156 stars
by duy-31 · client-side
https://github.com/duy-31/CVE-2024-21413
This repository contains a functional exploit PoC for CVE-2024-21413, which leverages Microsoft Outlook's vulnerability to leak credentials and achieve remote code execution when chained with CVE-2023-21716. The exploit uses an Expect script to send a crafted email with a malicious link that triggers credential leakage via SMB.
Classification
Working Poc 95%
Attack Type
Info Leak | Rce
Target:
Microsoft Outlook (affected versions)
No auth needed
Prerequisites:
Valid SMTP server access · Legitimate sender email (to pass SPF/DKIM/DMARC) · SMB listener setup · Victim interaction (clicking the link in Outlook preview)
nomisec
SUSPICIOUS
24 stars
by ThemeHackers · client-side
https://github.com/ThemeHackers/CVE-2024-21413
The repository contains a Python script that sends emails but lacks any exploit code or technical details related to CVE-2024-21413. The README and code are filled with generic features and ASCII art, with no actual vulnerability analysis or exploitation logic.
Classification
Suspicious 90%
Target:
unknown
No auth needed
Prerequisites:
SMTP credentials · email template file
nomisec
WORKING POC
16 stars
by r00tb1t · client-side
https://github.com/r00tb1t/CVE-2024-21413-POC
This repository contains a functional PoC for CVE-2024-21413, a vulnerability in Microsoft Outlook that allows an attacker to send a crafted email with a malicious link, leading to NTLM credential theft via SMB. The script automates the email sending process using telnet and pexpect.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2024-21413)
No auth needed
Prerequisites:
Access to an SMTP server · SMB listener setup · Crafted malicious file shared via SMB
nomisec
WORKING POC
11 stars
by mmathivanan17 · remote
https://github.com/mmathivanan17/CVE-2024-21413
This repository contains a functional Python exploit for CVE-2024-21413 (MonikerLink), which abuses Microsoft Outlook's handling of malicious URLs in emails to achieve remote code execution. The exploit sends a crafted email with a `file://` URL that triggers SMB authentication requests, leading to credential theft or further exploitation.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2024-21413)
Auth required
Prerequisites:
Access to an SMTP server · Victim's email address · Responder or SMB server setup for credential capture
nomisec
WORKING POC
5 stars
by Mdusmandasthaheer · client-side
https://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
The repository contains a functional Python script that exploits CVE-2024-21413, a critical RCE vulnerability in Microsoft Outlook. The exploit sends a crafted email with a malicious link attachment, leveraging the MonikerLink vulnerability to bypass Protected View and execute arbitrary code.
Classification
Working Poc 90%
Target:
Microsoft Outlook
Auth required
Prerequisites:
Valid Outlook email credentials · Recipient interaction (clicking the malicious link)
nomisec
WORKING POC
4 stars
by D1se0 · client-side
https://github.com/D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB
This repository contains functional Python scripts to exploit CVE-2024-21413, an Outlook vulnerability that leverages the file:// protocol to trigger SMB connections and capture NTLM credentials. It includes tools for sending malicious emails and capturing hashes via Responder.
Classification
Working Poc 95%
Target:
Microsoft Outlook
Auth required
Prerequisites:
SMTP server access · valid email credentials · network access to victim
nomisec
SUSPICIOUS
4 stars
by ahmetkarakayaoffical · client-side
https://github.com/ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
The repository claims to provide a PoC for CVE-2024-21413 (Microsoft Outlook RCE via MonikerLink) but lacks actual exploit code. It describes SMTP-based delivery and NTLM leak/RCE capabilities but only includes a README with usage instructions and no functional code.
Classification
Suspicious 90%
Target:
Microsoft Outlook
Auth required
Prerequisites:
SMTP server access · valid credentials · target email address
nomisec
WORKING POC
2 stars
by gurleen-147 · client-side
https://github.com/gurleen-147/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoC
This repository contains a functional Python script that exploits CVE-2024-21413, a Microsoft Outlook vulnerability involving MonikerLink behavior. The exploit sends a crafted email with a malicious 'file://' hyperlink, triggering an outbound NTLM authentication attempt to an attacker-controlled SMB server, leading to credential leakage.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2024-21413)
No auth needed
Prerequisites:
Attacker-controlled SMB server · Victim interaction (clicking the link) · Network connectivity between victim and attacker
nomisec
WORKING POC
2 stars
by X-Projetion · infoleak
https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit
This repository contains a functional exploit for CVE-2024-21413, a Microsoft Outlook RCE vulnerability. The exploit uses a crafted email with a malicious link to trigger remote code execution via a file:// URI handler.
Classification
Working Poc 90%
Target:
Microsoft Outlook (versions affected by CVE-2024-21413)
No auth needed
Prerequisites:
Access to an SMTP server for sending emails · Target user interaction (opening the email)
nomisec
WORKING POC
2 stars
by dshabani96 · client-side
https://github.com/dshabani96/CVE-2024-21413
This repository contains a functional PoC for CVE-2024-21413, a Microsoft Outlook RCE vulnerability. The script sends a crafted email with an HTML template and uses Impacket to capture NTLM hashes, demonstrating the exploit chain.
Classification
Working Poc 90%
Target:
Microsoft Outlook
Auth required
Prerequisites:
SMTP server access · Impacket installation · Root privileges
nomisec
WORKING POC
1 stars
by PolarisXSec · client-side
https://github.com/PolarisXSec/CVE-2024-21413
This repository contains a functional exploit for CVE-2024-21413, targeting Outlook to leak NTLM hashes via malicious UNC links. It includes Python scripts for SMTP/POP3 servers and an exploit script to send the malicious email.
Classification
Working Poc 80%
Target:
Microsoft Outlook 2016 (version 16.0.4266.1001)
No auth needed
Prerequisites:
Python 3.10+ · SMTP/POP3 servers · Responder or similar SMB server · Victim interaction (clicking a link)
nomisec
WORKING POC
by FathanahHidayati · client-side
https://github.com/FathanahHidayati/https-github.com-xaitax-CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
This repository contains a functional PoC for CVE-2024-21413, which exploits a vulnerability in Microsoft Outlook by sending a crafted email with a malicious file:// URL. The exploit leverages SMTP authentication to deliver the payload, triggering remote code execution when the recipient interacts with the email.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2024-21413)
Auth required
Prerequisites:
SMTP server access · valid SMTP credentials · recipient email address
nomisec
WRITEUP
by pedro-lucas-melo · client-side
https://github.com/pedro-lucas-melo/Estudo-de-Caso-CVE-2024-21413
This repository provides a detailed technical analysis of CVE-2024-21413, including root cause analysis, CVSS breakdown, and mitigation strategies. It explains how improper input validation in Microsoft Outlook allows NTLM credential leaks via crafted COM Moniker URLs.
Classification
Writeup 100%
Target:
Microsoft Outlook (multiple versions)
No auth needed
Prerequisites:
Victim interaction (clicking a malicious link)
nomisec
WRITEUP
by TheMursalin · poc
https://github.com/TheMursalin/HTB-Mailing-A-Complete-Walkthrough
This is a detailed technical walkthrough of the HTB 'Mailing' machine, covering multiple vulnerabilities including directory traversal, credential leaks, CVE-2024-21413 (NetNTLMv2 hash capture), and CVE-2023-2255 (LibreOffice macro execution). It provides step-by-step exploitation details, patch analysis, and root cause explanations.
Classification
Writeup 100%
Target:
hMailServer, Microsoft Outlook/Windows Mail, LibreOffice
No auth needed
Prerequisites:
Network access to target · Basic enumeration tools (nmap, ffuf) · Exploit scripts for CVE-2024-21413 and CVE-2023-2255
nomisec
WRITEUP
by E-m-e-k-a · poc
https://github.com/E-m-e-k-a/Moniker-Link-Lab-Setup
This repository provides a detailed technical walkthrough of exploiting CVE-2024-21413, focusing on NTLM credential theft via moniker link attacks. It includes lab setup, attack execution steps, and challenges encountered during testing.
Classification
Writeup 95%
Target:
Microsoft Windows (10/11)
No auth needed
Prerequisites:
Kali Linux with Responder · Windows target system · Network access to target
gitlab
SUSPICIOUS
by ThemeHackers · poc
https://gitlab.com/ThemeHackers/CVE-2024-21413
The repository contains a Python script that sends emails but lacks technical details about CVE-2024-21413. It relies on external configuration and templates, and the README is not provided for further analysis.
Classification
Suspicious 90%
Target:
Unknown
Auth required
Prerequisites:
SMTP credentials · email template file
nomisec
WRITEUP
by SallocinAvalcante · poc
https://github.com/SallocinAvalcante/lab-SMB-responder-CVE-2024-21413
This repository provides a detailed technical analysis of CVE-2024-21413 (MonikerLink), explaining how the vulnerability exploits SMB/NTLM for credential theft, the impact of Microsoft's patch, and a lab setup demonstrating the attack using Responder and Hashcat.
Classification
Writeup 95%
Target:
Microsoft Outlook (pre-patch KB5002519)
No auth needed
Prerequisites:
Network access to target · SMB/NTLM enabled on target · Responder and Hashcat tools
nomisec
WRITEUP
by securenetexpert · poc
https://github.com/securenetexpert/CVE-2024-21413-Moniker-Link-Writeup
This repository provides a detailed technical write-up of CVE-2024-21413, explaining how Microsoft Outlook's improper handling of Moniker Links can lead to NTLMv2 credential leakage. It includes an exploitation process, security impact analysis, and mitigation strategies.
Classification
Writeup 100%
Target:
Microsoft Outlook
No auth needed
Prerequisites:
Victim interaction (clicking a malicious link) · Attacker-controlled SMB listener
nomisec
WORKING POC
by dionissh · client-side
https://github.com/dionissh/CVE-2024-21413
This repository contains a functional PoC for CVE-2024-21413, a Microsoft Outlook RCE vulnerability. The script sends a crafted email with an HTML template and uses Impacket to capture NTLM hashes, demonstrating the exploit chain.
Classification
Working Poc 95%
Target:
Microsoft Outlook
Auth required
Prerequisites:
SMTP server access · Impacket installation · Root privileges
nomisec
WRITEUP
by ViniciusFariasDev · poc
https://github.com/ViniciusFariasDev/cve-2024-21413-outlook-monikerlink-lab
The repository provides educational lab notes and a high-level PoC for CVE-2024-21413, detailing how a crafted Moniker Link in Outlook can bypass Protected View and leak netNTLMv2 hashes via SMB authentication attempts. It includes technical context on the attack flow but lacks functional exploit code.
Classification
Writeup 90%
Target:
Microsoft Outlook
No auth needed
Prerequisites:
Victim interaction (opening email) · SMB capture tool (e.g., Responder)
nomisec
WRITEUP
by eylommaayan · poc
https://github.com/eylommaayan/THM---CVE-2024-21413-Moniker-Link-Microsoft-Outlook-
This repository provides a detailed technical analysis of CVE-2024-21413, a Moniker Link vulnerability in Microsoft Outlook that allows bypassing Protected View to leak NTLM hashes. It includes a step-by-step breakdown of the exploit mechanism, detection methods, and mitigation strategies.
Classification
Writeup 95%
Target:
Microsoft Outlook (various versions)
No auth needed
Prerequisites:
Victim interaction (clicking a malicious link) · Network access to attacker-controlled server
nomisec
WORKING POC
by hau2212 · client-side
https://github.com/hau2212/Moniker-Link-CVE-2024-21413-
This repository contains a functional Python script that exploits CVE-2024-21413, a Microsoft Outlook vulnerability involving Moniker Links. The exploit bypasses Outlook's Protected View by using a crafted 'file://' hyperlink with a '!' character, leading to NTLM credential leakage when the victim clicks the link.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions: Office LTSC 2021, 365 Apps for Enterprise, Office 2019, Office 2016 before 16.0.5435.1001)
No auth needed
Prerequisites:
Attacker-controlled SMTP server · Victim interaction (clicking the malicious link) · Network connectivity to capture NTLM hashes
nomisec
WORKING POC
by yass2400012 · client-side
https://github.com/yass2400012/Email-exploit-Moniker-Link-CVE-2024-21413-
This repository contains a functional Python script that crafts an HTML email with a Moniker Link to trigger an SMB connection from Outlook, allowing the capture of a victim's netNTLMv2 hash via Responder. The PoC includes detailed setup instructions, troubleshooting steps, and screenshots demonstrating the exploit workflow.
Classification
Working Poc 95%
Target:
Microsoft Outlook (versions affected by CVE-2024-21413)
No auth needed
Prerequisites:
Responder tool installed · SMTP server access · Victim interaction (clicking the link)
nomisec
WRITEUP
by MQKGitHub · poc
https://github.com/MQKGitHub/Moniker-Link-CVE-2024-21413
This repository provides a detailed technical analysis of CVE-2024-21413, a vulnerability in Microsoft Outlook that bypasses Protected View using Moniker Links to leak NTLM credentials. It includes an explanation of the attack mechanism, tools used, and mitigation strategies.
Classification
Writeup 90%
Target:
Microsoft Outlook
No auth needed
Prerequisites:
Victim interaction (clicking a malicious link) · Responder tool for capturing NTLM hashes
nomisec
WRITEUP
by ArtemCyberLab · infoleak
https://github.com/ArtemCyberLab/Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413
The repository provides a technical walkthrough of capturing NTLM hashes using Responder and executing phishing attacks via email, demonstrating the exploitation of CVE-2024-21413. It includes detailed steps, commands, and a Python script for sending phishing emails with malicious links.
Classification
Writeup 90%
Target:
Microsoft Outlook (specific version not specified)
No auth needed
Prerequisites:
Network access to intercept LLMNR/NBT-NS/MDNS queries · Valid email credentials for sending phishing emails · Victim interaction to click malicious link
github
SUSPICIOUS
by Cyber-Trambon · poc
https://github.com/Cyber-Trambon/CVE-2024-21413-exploit
The repository claims to be an exploit for CVE-2024-21413 but lacks actual exploit code, instead directing users to an external download link. The README is vague and lacks technical details about the vulnerability.
Classification
Suspicious 95%
Target:
Microsoft Outlook
No auth needed
Prerequisites:
none provided
nomisec
WORKING POC
by olebris · client-side
https://github.com/olebris/CVE-2024-21413
This PoC exploits CVE-2024-21413, a remote code execution vulnerability in Microsoft Outlook, by sending a crafted email with a malicious HTML payload. The script uses SMTP to deliver the email, which triggers the vulnerability when the recipient opens it.
Classification
Working Poc 90%
Target:
Microsoft Outlook (version not specified)
Auth required
Prerequisites:
SMTP server credentials · Valid email addresses for sender and recipient
nomisec
WORKING POC
by ShubhamKanhere307 · client-side
https://github.com/ShubhamKanhere307/CVE-2024-21413
This repository contains a functional PoC for CVE-2024-21413, a critical RCE vulnerability in Microsoft Windows Outlook. The exploit leverages a crafted email with a malicious link attachment to achieve remote code execution on the victim's machine.
Classification
Working Poc 90%
Target:
Microsoft Windows Outlook
Auth required
Prerequisites:
Valid Outlook email credentials · Victim interaction to open the email and click the link
nomisec
WORKING POC
by th3Hellion · client-side
https://github.com/th3Hellion/CVE-2024-21413
This repository contains a functional exploit for CVE-2024-21413, a Microsoft Outlook RCE vulnerability. The PoC sends a crafted email with a malicious file:// link to trigger the vulnerability, requiring attacker-controlled infrastructure to achieve code execution.
Classification
Working Poc 90%
Target:
Microsoft Outlook (versions affected by CVE-2024-21413)
Auth required
Prerequisites:
Valid SMTP credentials · Attacker-controlled listener · Target Outlook client vulnerable to CVE-2024-21413
nomisec
WORKING POC
by KartheekKandalam99 · poc
https://github.com/KartheekKandalam99/SVPT_CW_2
This repository contains a functional exploit for CVE-2024-21413, which involves sending a crafted email with a malicious link to trigger NTLMv2 hash capture via Responder. The exploit leverages Outlook's handling of file:// URIs to bypass security warnings.
Classification
Working Poc 90%
Target:
Microsoft Outlook (versions affected by CVE-2024-21413)
Auth required
Prerequisites:
Access to an SMTP server · Responder tool for NTLMv2 hash capture · TryHackMe environment or similar setup
nomisec
WORKING POC
by MSeymenD · client-side
https://github.com/MSeymenD/CVE-2024-21413
This repository contains a functional exploit PoC for CVE-2024-21413, leveraging PHPMailer to craft a malicious email that triggers an SMB connection to an attacker-controlled server, exfiltrating Windows credentials via NTLM authentication.
Classification
Working Poc 90%
Target:
Microsoft Outlook (via PHPMailer 5.2.2)
No auth needed
Prerequisites:
PHP environment with PHPMailer · Attacker-controlled SMB server (e.g., impacket-smbserver) · Victim interaction (clicking a link in the email)