KaLendsi / CVE-2021-40449-Exploit
windows 10 14393 LPE
☆94Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2021-40449-Exploit
- Exploit for CVE-2021-40449☆52Updated 3 years ago
- Windows Etw LPE☆50Updated 3 years ago
- Windows Common Log File System Driver POC☆94Updated 2 years ago
- cve-2022-39197 poc☆73Updated 2 years ago
- Cobalt strike custom 404 page☆63Updated 4 years ago
- Microsoft Exchange Server Poc☆84Updated 2 years ago
- UAC_wenpon☆48Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 2 years ago
- CVE-2021-1675 (PrintNightmare)☆74Updated 3 years ago
- Poc of CVE-2022-22980☆32Updated 2 years ago
- Csharp 反射加载dll☆39Updated 3 years ago
- 自不量力的mimikatz分离计划☆44Updated 2 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆77Updated 2 years ago
- RCE Exploit for Gitlab < 13.9.4☆51Updated 3 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆58Updated 3 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- SystemGap - Maintenance Tools after privilege escalation☆40Updated 4 months ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆79Updated 2 years ago
- proxyshell payload generate☆72Updated 3 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 2 years ago
- Exchange ProxyRelay POC☆36Updated 2 years ago
- An EternalBlue exploit implementation in pure go☆95Updated 3 years ago
- cmd2shellcode☆78Updated 3 years ago
- ☆46Updated 3 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆33Updated last year
- bypass BeaconEye☆88Updated 3 years ago