Levilutz / CVE-2021-30860
Scan for evidence of CVE-2021-30860 (FORCEDENTRY) exploit
☆11Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2021-30860
- ☆10Updated 2 years ago
- POC for CVE-2021-1699☆15Updated 3 years ago
- A collection of weaponized LPE exploits written in Go☆49Updated 3 weeks ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆22Updated 2 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆29Updated 3 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 2 years ago
- Explanation and PoC for CVE-2020-16152☆12Updated 4 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆24Updated 3 years ago
- Post-Exploitation script to exfiltrate 7-zip files☆10Updated 2 years ago
- ☆14Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- An AV evasion PoC tool☆9Updated 6 years ago
- ☆18Updated 2 years ago
- Concept:☆10Updated 2 years ago
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆15Updated last year
- golang String Obfuscate☆9Updated 2 years ago
- SSRF 绕过 Payload☆15Updated 4 years ago
- Package that provides different PE tricks to difficult the reverse engineering of your Windows applications.☆11Updated 4 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 2 years ago
- Postgres Extension to Execute Shellcodes☆14Updated 3 years ago
- ☆14Updated 3 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆12Updated 2 years ago
- Example of async client/server sockets in .NET 5☆16Updated 3 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- L3 proxy backed by Shadowsocks☆10Updated last year
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated 11 months ago