0dayNinja / CVE-2021-3560Links
Polkit D-Bus Authentication Bypass Exploit
☆10Updated 4 years ago
Alternatives and similar repositories for CVE-2021-3560
Users that are interested in CVE-2021-3560 are comparing it to the libraries listed below
Sorting:
- Aruba Instant (IAP) - Remote Code Execution Exploit☆11Updated 4 years ago
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆14Updated 4 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆11Updated 4 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆14Updated 4 years ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆51Updated 4 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- Transform your batch (bat) script into one binary.exe☆52Updated last year
- pen testing scripts☆12Updated 4 years ago
- Python Reverse Shell Builder with some advanced functionalities☆12Updated 4 years ago
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆17Updated 2 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 7 months ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- A semi-automatic osint/recon framework.☆25Updated last year
- AES Ransomware in batch☆11Updated last year
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- ☆16Updated 4 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Updated 5 years ago
- ☆15Updated 3 years ago
- Handy script to automate the attack☆21Updated 5 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 6 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- Manage the metasploit framework database☆16Updated 4 years ago
- Other tools developed by CIRT.net☆23Updated 5 years ago