Ayrx / CVE-2021-4034Links
Exploit for CVE-2021-4034
☆94Updated 3 years ago
Alternatives and similar repositories for CVE-2021-4034
Users that are interested in CVE-2021-4034 are comparing it to the libraries listed below
Sorting:
- ☆121Updated 2 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆67Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 3 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Updated 4 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 4 years ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- Simple AV Evasion for PE Files☆43Updated 4 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- A robust Red Team proxy written in Go.☆166Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆94Updated 4 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Updated 3 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆24Updated 5 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- Impersonating authentication over HTTP and/or named pipes.☆143Updated 4 years ago
- An AV exclusion enumeration tool written in Python.☆60Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆201Updated 5 months ago
- offensive notes & resources☆43Updated 8 months ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago
- ☆50Updated 3 years ago
- ☆95Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- POC and Scanner for CVE-2023-24055☆65Updated 2 years ago
- Creates and sends fake meeting invite☆73Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆202Updated 4 years ago
- Loads a custom dll in system32 via diaghub.☆82Updated 5 years ago