PwnFunction / CVE-2021-4034Links
Proof of concept for pwnkit vulnerability
☆344Updated 2 years ago
Alternatives and similar repositories for CVE-2021-4034
Users that are interested in CVE-2021-4034 are comparing it to the libraries listed below
Sorting:
- Kernel exploitation technique☆574Updated last year
- a CTF web challenge about making screenshots☆225Updated 3 years ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆607Updated 2 years ago
- Using z3 to predict `Math.random` in v8☆300Updated 2 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆236Updated 2 months ago
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆685Updated 3 years ago
- Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found☆336Updated last year
- 🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables…☆337Updated 2 years ago
- CVE-2022-0995 exploit☆497Updated 3 years ago
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆315Updated 2 years ago
- Prototype Pollution using `flat` with Next.js☆103Updated 2 weeks ago
- ☆391Updated 2 months ago
- ☆232Updated 2 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,104Updated 3 years ago
- Security Research☆39Updated 2 years ago
- Local privilege escalation PoC for Linux kernel CVE-2022-1015☆202Updated 3 years ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- ☆145Updated last month
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- Small example repo for looking into log4j CVE-2021-44228☆71Updated 3 years ago
- Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information☆180Updated 3 years ago
- Some challenge solutions solved using z3☆218Updated 2 years ago
- Hash identification program.☆151Updated 3 years ago
- Files + Writeups for DownUnderCTF 2022 Challenges☆251Updated 2 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆91Updated 3 weeks ago
- ☆35Updated 4 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆177Updated 3 years ago
- ☆281Updated 3 years ago
- tool for generating wordlists or extending an existing one using mutations.☆385Updated 2 months ago
- The Django backend running RACTF wargame events.☆25Updated 6 months ago