Cybellum / Vulnerabilities
Some of the vulnerabilities that were found by Cybellum platform
☆32Updated 6 years ago
Alternatives and similar repositories for Vulnerabilities:
Users that are interested in Vulnerabilities are comparing it to the libraries listed below
- Win32k Elevation of Privilege Poc☆0Updated 5 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- ☆24Updated 6 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆21Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆29Updated 7 years ago
- ☆12Updated 8 years ago
- A simple reflective dll example☆18Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Shellcode Of Death☆38Updated 11 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- CVE-2019-12949☆26Updated 5 years ago
- ☆22Updated 7 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago