0dayNinja / CVE-2021-3560
Polkit D-Bus Authentication Bypass Exploit
☆10Updated 3 years ago
Alternatives and similar repositories for CVE-2021-3560:
Users that are interested in CVE-2021-3560 are comparing it to the libraries listed below
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆11Updated 3 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆14Updated 3 years ago
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆14Updated 3 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Updated 3 years ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆52Updated 3 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Github Profile Readme☆11Updated 2 months ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- A semi-automatic osint/recon framework.☆24Updated 10 months ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Updated 5 years ago
- ShellC0de Generator☆11Updated 3 years ago
- AES Ransomware in batch☆11Updated 9 months ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- Stealer of sessions of the Telegram Desktop application on windows 7, 8 and 10 🔑☆9Updated 4 years ago
- Wordlists generated over the years of penetration testing☆11Updated last week
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 3 weeks ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Web App Pen Tester (Web Interface)☆31Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- Python Reverse Shell Builder with some advanced functionalities☆12Updated 4 years ago