KaLendsi / CVE-2021-40449-Exploit
windows 10 14393 LPE
☆95Updated 3 years ago
Alternatives and similar repositories for CVE-2021-40449-Exploit:
Users that are interested in CVE-2021-40449-Exploit are comparing it to the libraries listed below
- Exploit for CVE-2021-40449☆52Updated 3 years ago
- CVE-2021-1675 (PrintNightmare)☆75Updated 3 years ago
- Windows Etw LPE☆50Updated 3 years ago
- Windows Common Log File System Driver POC☆94Updated 3 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆58Updated 3 years ago
- Cobalt strike custom 404 page☆63Updated 4 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- Exchange2010 authorized RCE☆154Updated 4 years ago
- Microsoft Exchange Server Poc☆85Updated 3 years ago
- RCE Exploit for Gitlab < 13.9.4☆51Updated 3 years ago
- proxylogon exploit - CVE-2021-26857☆113Updated 4 years ago
- CVE-2020-1472 C++☆81Updated 2 years ago
- ☆17Updated 3 years ago
- bypass BeaconEye☆88Updated 3 years ago
- cve-2022-39197 poc☆73Updated 2 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆79Updated 2 years ago
- Defense Evasion & Bypass AntiVirus reference☆74Updated 3 years ago
- JScript RAT☆99Updated 4 years ago
- UAC_wenpon☆48Updated 3 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆60Updated 9 months ago
- ☆13Updated 3 years ago
- SystemGap - Maintenance Tools after privilege escalation☆40Updated 9 months ago
- Kernel file/process/object tool☆64Updated 3 years ago
- CVE-2022-25943☆59Updated 3 years ago
- Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444☆17Updated 3 years ago
- ☆36Updated 4 years ago
- Bypass cobaltstrike beacon config scan☆82Updated 3 years ago
- Dumping Windows Local Credentials Tools/Tricks☆68Updated 5 years ago
- StenographyShellcodeLoader☆42Updated 4 years ago