☆24Jun 29, 2021Updated 4 years ago
Alternatives and similar repositories for Polkit-CVE-2021-3560
Users that are interested in Polkit-CVE-2021-3560 are comparing it to the libraries listed below
Sorting:
- Vulnerable docker images for CVE-2021-41773☆23Oct 6, 2021Updated 4 years ago
- Bypassing AWS WAF using a single ';'☆40Aug 1, 2018Updated 7 years ago
- Basic Dart reverse shell code☆21Nov 10, 2023Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- My Blog☆12Feb 4, 2026Updated last month
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- ☆12Dec 14, 2021Updated 4 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- Some of my drawings☆12May 6, 2022Updated 3 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- (CNVD-2021-26422)亿邮电子邮件系统 远程命令执行漏洞☆12Apr 28, 2021Updated 4 years ago
- detects several virtualizations☆45Dec 29, 2015Updated 10 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- An exploit/PoC for CVE-2021-42237☆14Jan 16, 2022Updated 4 years ago
- Cobalt Strike teamserver detection.☆16Apr 26, 2021Updated 4 years ago
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- Icon file generator for Windows, macOS, Web☆15Oct 6, 2024Updated last year
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Apr 18, 2022Updated 3 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- Load ssp dll golang implementation☆19Jan 18, 2022Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆19Sep 12, 2014Updated 11 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Jul 26, 2021Updated 4 years ago
- 动态链接库加载工具☆20Jan 26, 2022Updated 4 years ago
- ☆23Aug 18, 2024Updated last year
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- 应急响应实战笔记,一个安全工程师的自我修养。☆20Jun 2, 2019Updated 6 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Aug 5, 2022Updated 3 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- 适合渗透测试人员使用的chrome渗透辅助插件☆20May 23, 2019Updated 6 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆158Jul 22, 2021Updated 4 years ago
- Golang Trojan☆20Mar 15, 2017Updated 8 years ago
- CVE-2020-13277 靶场: Gitlab 逻辑漏洞 - 任意用户越权访问私有仓库☆27Jan 24, 2023Updated 3 years ago
- Python script to compress VBA macro files☆24Feb 2, 2023Updated 3 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year