KaLendsi / CVE-2021-40449-ExploitLinks
windows 10 14393 LPE
☆97Updated 3 years ago
Alternatives and similar repositories for CVE-2021-40449-Exploit
Users that are interested in CVE-2021-40449-Exploit are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2021-40449☆52Updated 3 years ago
- Windows Common Log File System Driver POC☆95Updated 3 years ago
- Windows Etw LPE☆50Updated 3 years ago
- Microsoft Exchange Server Poc☆85Updated 3 years ago
- Cobalt strike custom 404 page☆63Updated 5 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆35Updated 2 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 3 years ago
- bypass BeaconEye☆88Updated 3 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- Bypass cobaltstrike beacon config scan☆84Updated 4 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 3 years ago
- UAC_wenpon☆48Updated 3 years ago
- SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)☆95Updated 3 years ago
- Kernel file/process/object tool☆67Updated 3 years ago
- proxylogon exploit - CVE-2021-26857☆113Updated 4 years ago
- JScript RAT☆101Updated 4 years ago
- RCE Exploit for Gitlab < 13.9.4☆51Updated 4 years ago
- ☆20Updated 4 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- Exchange2010 authorized RCE☆156Updated 4 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 2 years ago
- ☆74Updated 3 years ago
- ShellCode Loader for MSF and Cobalt Strike☆55Updated last year
- Poc of CVE-2022-22980☆32Updated 2 years ago
- ☆91Updated 3 years ago
- CVE-2019-1458 Windows LPE Exploit☆135Updated 5 years ago
- cve-2022-39197 poc☆73Updated 2 years ago
- ☆49Updated 3 years ago
- ☆100Updated 2 years ago