Nmap script to check vulnerability CVE-2021-21975
☆27Apr 2, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-21975
Users that are interested in CVE-2021-21975 are comparing it to the libraries listed below
Sorting:
- Terminate the eventlog thread to disable the windows eventlog☆21Apr 1, 2020Updated 5 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- android-inject-hook☆15Feb 8, 2018Updated 8 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- Swagger Directory Enumeration (SDE)☆21Jan 16, 2021Updated 5 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Jul 3, 2021Updated 4 years ago
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- Some useful test data or payloads☆24Oct 30, 2021Updated 4 years ago
- IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)☆52Sep 19, 2023Updated 2 years ago
- 😁 BurpSuite Pro Auto Installation Script For Linux And Windows! 👍☆20Jan 5, 2021Updated 5 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago
- XSS Payload without Anything.☆104Jun 28, 2019Updated 6 years ago
- CVE-2022-46463(Harbor 未授权)☆30Jul 15, 2025Updated 7 months ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- ☆27Jun 17, 2021Updated 4 years ago
- com_media allowed paths that are not intended for image uploads to RCE☆71Mar 3, 2021Updated 5 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆34Aug 26, 2021Updated 4 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Jul 25, 2021Updated 4 years ago
- Hide cool stuff in images :)☆147Aug 9, 2020Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Nov 19, 2021Updated 4 years ago