0vercl0k / CVE-2021-31166Links
Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.
☆833Updated 4 years ago
Alternatives and similar repositories for CVE-2021-31166
Users that are interested in CVE-2021-31166 are comparing it to the libraries listed below
Sorting:
- PoC exploits for software vulnerabilities☆685Updated 4 years ago
- Microsoft » Windows 10 : Security Vulnerabilities☆922Updated last month
- HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907☆365Updated 3 years ago
- PoC for CVE-2021-3156 (sudo heap overflow)☆434Updated 3 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆391Updated 5 years ago
- c++ fully undetected shellcode launcher ;)☆978Updated 4 years ago
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆280Updated 4 years ago
- CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit☆822Updated 2 years ago
- ☆1,000Updated 4 years ago
- Exploit for zerologon cve-2020-1472☆677Updated 5 years ago
- CVE-2020-0796 Remote Code Execution POC☆569Updated 5 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,344Updated 5 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,268Updated 5 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆953Updated 3 years ago
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆679Updated 3 years ago
- ☆1,374Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,391Updated 4 years ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆546Updated 4 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆850Updated 8 months ago
- PoC exploits I wrote. They're as is and I will not offer support☆277Updated last year
- Sudo Baron Samedit Exploit☆788Updated 3 years ago
- CVE-2022-0995 exploit☆499Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,434Updated 3 years ago
- win32k LPE☆467Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,036Updated 3 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCE☆708Updated 5 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆807Updated last year
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,951Updated 4 years ago
- A malicious LDAP server for JNDI injection attacks☆1,075Updated 2 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆424Updated 4 years ago