KaLendsi / CVE-2021-40449-Exploit
windows 10 14393 LPE
☆97Updated 3 years ago
Alternatives and similar repositories for CVE-2021-40449-Exploit
Users that are interested in CVE-2021-40449-Exploit are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2021-40449☆52Updated 3 years ago
- Windows Common Log File System Driver POC☆95Updated 3 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 3 years ago
- Windows Etw LPE☆50Updated 3 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- Cobalt strike custom 404 page☆63Updated 5 years ago
- RCE Exploit for Gitlab < 13.9.4☆51Updated 3 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 3 years ago
- bypass BeaconEye☆88Updated 3 years ago
- Microsoft Exchange Server Poc☆85Updated 3 years ago
- Kernel file/process/object tool☆67Updated 3 years ago
- ☆31Updated 3 years ago
- Bypass cobaltstrike beacon config scan☆84Updated 3 years ago
- ☆20Updated 4 years ago
- ☆37Updated 5 years ago
- An EternalBlue exploit implementation in pure go☆97Updated 4 years ago
- weaponized tool for CVE-2020-17144☆159Updated 4 years ago
- proxylogon exploit - CVE-2021-26857☆113Updated 4 years ago
- ☆40Updated 3 years ago
- cve-2022-39197 poc☆73Updated 2 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 2 years ago
- Defense Evasion & Bypass AntiVirus reference☆74Updated 4 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆34Updated 2 years ago
- Poc of CVE-2022-22980☆32Updated 2 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Updated 8 months ago
- ☆93Updated 3 years ago
- UAC_wenpon☆48Updated 3 years ago
- An easy way to getsystem by golang.☆55Updated 3 years ago
- ☆61Updated 2 years ago