AssassinUKG / Polkit-CVE-2021-3560View external linksLinks
☆24Jun 29, 2021Updated 4 years ago
Alternatives and similar repositories for Polkit-CVE-2021-3560
Users that are interested in Polkit-CVE-2021-3560 are comparing it to the libraries listed below
Sorting:
- Vulnerable docker images for CVE-2021-41773☆22Oct 6, 2021Updated 4 years ago
- Bypassing AWS WAF using a single ';'☆39Aug 1, 2018Updated 7 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Basic Dart reverse shell code☆21Nov 10, 2023Updated 2 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- My Blog☆12Feb 4, 2026Updated last week
- ☆13Oct 3, 2023Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Some of my drawings☆12May 6, 2022Updated 3 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- (CNVD-2021-26422)亿邮电子邮件系统 远程命令执行漏洞☆12Apr 28, 2021Updated 4 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- An exploit/PoC for CVE-2021-42237☆14Jan 16, 2022Updated 4 years ago
- Cobalt Strike teamserver detection.☆16Apr 26, 2021Updated 4 years ago
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- Icon file generator for Windows, macOS, Web☆15Oct 6, 2024Updated last year
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Apr 18, 2022Updated 3 years ago
- Load ssp dll golang implementation☆19Jan 18, 2022Updated 4 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- A tiny, portable implementation of the IPCrypt specification in C.☆32Feb 3, 2026Updated last week
- Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.☆20Feb 2, 2022Updated 4 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Jul 26, 2021Updated 4 years ago
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆19Sep 12, 2014Updated 11 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- 应急响应实战笔记,一个安全工程师的自我修养。☆20Jun 2, 2019Updated 6 years ago
- ☆23Aug 18, 2024Updated last year
- RCE Exploit for Gitlab < 13.9.4☆51Jun 4, 2021Updated 4 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- 适合渗透测试人员使用的chrome渗透辅助插件☆20May 23, 2019Updated 6 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆158Jul 22, 2021Updated 4 years ago
- CVE-2020-13277 靶场: Gitlab 逻辑漏洞 - 任意用户越权访问私有仓库☆27Jan 24, 2023Updated 3 years ago
- Python script to compress VBA macro files☆24Feb 2, 2023Updated 3 years ago
- Swift implementation of in-memory Mach-O loading on macOS☆68Jul 19, 2022Updated 3 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year