Ayrx / CVE-2021-4034Links
Exploit for CVE-2021-4034
☆93Updated 3 years ago
Alternatives and similar repositories for CVE-2021-4034
Users that are interested in CVE-2021-4034 are comparing it to the libraries listed below
Sorting:
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- Exploit and Check Script for CVE 2022-1388☆58Updated 2 months ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Updated 3 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- ☆123Updated last year
- Fast and intuitive manager for multiple reverse shells☆85Updated 6 months ago
- Convert shellcode into different formats!☆353Updated 2 years ago
- ☆234Updated 7 months ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- MS-FSRVP coercion abuse PoC☆291Updated 3 years ago
- ☆101Updated 4 years ago
- ☆105Updated 2 years ago
- A robust Red Team proxy written in Go.☆160Updated 3 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆122Updated 3 years ago
- ☆93Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆131Updated last year
- ☆47Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆258Updated 3 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆278Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆110Updated 2 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆150Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆138Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆339Updated 2 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆186Updated 3 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆365Updated 4 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆307Updated 3 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago