GuayoyoCyber / CVE-2021-21975View external linksLinks
Nmap script to check vulnerability CVE-2021-21975
☆27Apr 2, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-21975
Users that are interested in CVE-2021-21975 are comparing it to the libraries listed below
Sorting:
- Terminate the eventlog thread to disable the windows eventlog☆21Apr 1, 2020Updated 5 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- android-inject-hook☆15Feb 8, 2018Updated 8 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆19May 19, 2023Updated 2 years ago
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- Swagger Directory Enumeration (SDE)☆21Jan 16, 2021Updated 5 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Jul 3, 2021Updated 4 years ago
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability☆21Mar 8, 2022Updated 3 years ago
- Some useful test data or payloads☆24Oct 30, 2021Updated 4 years ago
- IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)☆52Sep 19, 2023Updated 2 years ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago
- XSS Payload without Anything.☆104Jun 28, 2019Updated 6 years ago
- CVE-2022-46463(Harbor 未授权)☆30Jul 15, 2025Updated 7 months ago
- Script for Bug Bounty☆29Sep 17, 2021Updated 4 years ago
- Shadowsocks-like proxy written in Go☆37Dec 18, 2019Updated 6 years ago
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- ☆27Jun 17, 2021Updated 4 years ago
- com_media allowed paths that are not intended for image uploads to RCE☆71Mar 3, 2021Updated 4 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Stupid MQTT Brute Forcer☆32Jul 27, 2017Updated 8 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated last year
- ☆13Jul 13, 2020Updated 5 years ago