PwnFunction / CVE-2021-4034Links
Proof of concept for pwnkit vulnerability
☆345Updated 3 years ago
Alternatives and similar repositories for CVE-2021-4034
Users that are interested in CVE-2021-4034 are comparing it to the libraries listed below
Sorting:
- a CTF web challenge about making screenshots☆224Updated 4 years ago
- Using z3 to predict `Math.random` in v8☆341Updated 3 years ago
- Kernel exploitation technique☆582Updated 2 years ago
- Small example repo for looking into log4j CVE-2021-44228☆72Updated 4 years ago
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆676Updated 3 years ago
- Prototype Pollution using `flat` with Next.js☆108Updated last week
- Some challenge solutions solved using z3☆234Updated 3 years ago
- Hash identification program.☆152Updated 3 years ago
- Implementation of the Folders📂 esoteric programming language, a language with no code and just folders.☆451Updated 4 years ago
- Compress a Python script to a command-line one-liner☆78Updated 3 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 10 months ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆197Updated 3 years ago
- log4j rce test environment and poc☆311Updated 4 years ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 4 years ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆685Updated 2 years ago
- Rick Roll website that has hidden code.☆410Updated 3 years ago
- Source code of santagift.shop website.☆83Updated 3 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,127Updated 3 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆795Updated 3 years ago
- Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information☆183Updated 4 years ago
- ☆151Updated 2 months ago
- ☆239Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,475Updated 3 years ago
- A generator of weird files (binary polyglots, near polyglots, polymocks...)☆1,266Updated last year
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆386Updated 4 years ago
- 🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables…☆340Updated 3 years ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆878Updated 10 months ago
- This file contains the active ransomware, WannaCry☆152Updated 6 years ago
- Codebase to generate an msdt-follina payload☆1,634Updated 3 years ago