Edubr2020 / CVE-2021-40444--CABlessLinks
Modified code so that we don´t need to rely on CAB archives
☆101Updated 4 years ago
Alternatives and similar repositories for CVE-2021-40444--CABless
Users that are interested in CVE-2021-40444--CABless are comparing it to the libraries listed below
Sorting:
- This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit☆169Updated 3 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 5 years ago
- Exploit for CVE-2021-40449☆51Updated 3 years ago
- ☆63Updated 3 years ago
- ☆124Updated 3 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆188Updated 2 months ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Updated 5 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- ☆52Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆133Updated 3 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- Injects HTML/PHP/ASP to the PE☆103Updated 5 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆147Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆142Updated 4 years ago
- ☆170Updated 4 years ago
- Simple DLL that add a user to the local Administrators group☆78Updated 3 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- Convert shellcode generated using pe_2_shellcode to cdb format.☆99Updated 3 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- ☆14Updated 4 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- ☆71Updated 5 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆150Updated 3 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆142Updated 5 years ago