0dayNinja / CVE-2021-3560Links
Polkit D-Bus Authentication Bypass Exploit
☆10Updated 3 years ago
Alternatives and similar repositories for CVE-2021-3560
Users that are interested in CVE-2021-3560 are comparing it to the libraries listed below
Sorting:
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆14Updated 3 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆14Updated 3 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆11Updated 3 years ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆53Updated 3 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Updated 3 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- ShellC0de Generator☆11Updated 4 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 2 months ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- Yet another powerful payload encoder/decoder☆13Updated 3 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- A semi-automatic osint/recon framework.☆24Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- tool to rick roll access.logs☆17Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- The Hall of Ancient Exploitation Tools