PwnFunction / CVE-2021-4034Links
Proof of concept for pwnkit vulnerability
☆344Updated 2 years ago
Alternatives and similar repositories for CVE-2021-4034
Users that are interested in CVE-2021-4034 are comparing it to the libraries listed below
Sorting:
- a CTF web challenge about making screenshots☆224Updated 4 years ago
- Using z3 to predict `Math.random` in v8☆324Updated 3 years ago
- Kernel exploitation technique☆578Updated 2 years ago
- Small example repo for looking into log4j CVE-2021-44228☆71Updated 3 years ago
- Hash identification program.☆153Updated 3 years ago
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆685Updated 3 years ago
- Some challenge solutions solved using z3☆223Updated 3 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 7 months ago
- Compress a Python script to a command-line one-liner☆77Updated 2 years ago
- Rick Roll website that has hidden code.☆409Updated 3 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,120Updated 3 years ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆196Updated 3 years ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆653Updated 2 years ago
- Security Research☆39Updated 3 years ago
- Implementation of the Folders📂 esoteric programming language, a language with no code and just folders.☆449Updated 3 years ago
- log4j rce test environment and poc☆311Updated 3 years ago
- Source code of santagift.shop website.☆81Updated 2 years ago
- Nginx 18.1 04/09/22 zero-day repo☆372Updated 3 years ago
- CVE-2021-3156 - Sudo Baron Samedit☆222Updated 3 years ago
- Prototype Pollution using `flat` with Next.js☆106Updated 2 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆798Updated 3 years ago
- A remote access trojan to use against Santa's laptop!☆155Updated 3 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,846Updated last year
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆933Updated 2 months ago
- A python transpiler for rizzlers.☆58Updated 9 months ago
- Hayden Housen's solutions to the 2021 PicoCTF Competition☆57Updated 2 years ago
- Universal steganographic tool☆313Updated 4 years ago
- 🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables…☆340Updated 3 years ago
- ImaginaryCTF is a platform that brings the beauty of CTF Competitions to discord, releasing a challenge every day☆44Updated 6 months ago