AssassinUKG / CVE-2021-22204View external linksLinks
☆28Oct 26, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-22204
Users that are interested in CVE-2021-22204 are comparing it to the libraries listed below
Sorting:
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- A Generic WOW64 Process Blocker☆14Jul 16, 2021Updated 4 years ago
- CVE-2022-22639: Get a Root Shell on macOS Monterey☆122Apr 5, 2022Updated 3 years ago
- CrackCaptcahLogin☆16Nov 22, 2017Updated 8 years ago
- CVE-2022-22947_POC_EXP☆13Mar 17, 2022Updated 3 years ago
- 漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell☆13Mar 1, 2021Updated 4 years ago
- Scripts,shell used for solving box☆15Dec 28, 2020Updated 5 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Aug 30, 2021Updated 4 years ago
- CVE-2022-24990 TerraMaster TOS unauthenticated RCE via PHP Object Instantiation☆14Apr 25, 2022Updated 3 years ago
- Load ssp dll golang implementation☆19Jan 18, 2022Updated 4 years ago
- C++ code review checklist.☆17Aug 21, 2017Updated 8 years ago
- 逆向小红伞杀毒软件驱动——avdevprot☆24Dec 3, 2017Updated 8 years ago
- ☆48Nov 14, 2021Updated 4 years ago
- iOS 15.4 Jailbreak Exploit for CVE-2021-30807☆23Feb 25, 2022Updated 3 years ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- intel vt-x hypervisor ept☆25May 19, 2020Updated 5 years ago
- Fork of Dnmap (http://dnmap.sourceforge.net/)☆22Jul 14, 2022Updated 3 years ago
- CVE-2020-14882/14883/14750☆21Nov 4, 2020Updated 5 years ago
- laravel 5.8 rce pop chain☆26Oct 27, 2019Updated 6 years ago
- '>"><img src=x onerror=alert(1) /><b>asd</b>☆49Dec 20, 2021Updated 4 years ago
- iOS 12 / OS X Remote Kernel Heap Overflow (CVE-2018-4407) POC☆60Nov 1, 2018Updated 7 years ago
- This is a Cheatsheet for CTF Challenges categorized by different Privilege Escalation Methods☆28Aug 21, 2019Updated 6 years ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Jul 12, 2021Updated 4 years ago
- Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack☆27Mar 6, 2021Updated 4 years ago
- cs4.0 cs 4.1 beacon加解密☆25Mar 29, 2021Updated 4 years ago
- ☆30Jul 18, 2025Updated 6 months ago
- Some CVE resources☆27Nov 23, 2019Updated 6 years ago
- ☆65Dec 9, 2020Updated 5 years ago
- ☆36Jun 27, 2016Updated 9 years ago
- MacOS X process monitor using EndpointSecurity extension.☆37Sep 29, 2025Updated 4 months ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆36Feb 6, 2020Updated 6 years ago
- ☆63Sep 15, 2021Updated 4 years ago
- ☆36Sep 30, 2020Updated 5 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- ☆39Feb 10, 2021Updated 5 years ago
- Slides from various conference talks☆37May 30, 2023Updated 2 years ago