PwnFunction / CVE-2021-4034Links
Proof of concept for pwnkit vulnerability
☆346Updated 2 years ago
Alternatives and similar repositories for CVE-2021-4034
Users that are interested in CVE-2021-4034 are comparing it to the libraries listed below
Sorting:
- Kernel exploitation technique☆577Updated last year
- Using z3 to predict `Math.random` in v8☆306Updated 2 years ago
- a CTF web challenge about making screenshots☆225Updated 3 years ago
- Some challenge solutions solved using z3☆220Updated 2 years ago
- Small example repo for looking into log4j CVE-2021-44228☆71Updated 3 years ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆616Updated 2 years ago
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆685Updated 3 years ago
- log4j rce test environment and poc☆312Updated 3 years ago
- Hash identification program.☆153Updated 3 years ago
- Prototype Pollution using `flat` with Next.js☆104Updated this week
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆193Updated 2 years ago
- Compress a Python script to a command-line one-liner☆77Updated 2 years ago
- Rick Roll website that has hidden code.☆408Updated 3 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,835Updated last year
- A generator of weird files (binary polyglots, near polyglots, polymocks...)☆1,225Updated 6 months ago
- Security Research☆39Updated 2 years ago
- Implementation of the Folders📂 esoteric programming language, a language with no code and just folders.☆445Updated 3 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated 2 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,108Updated 3 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆235Updated 3 months ago
- The new up and coming operating system☆186Updated 9 months ago
- Just npm install☆219Updated 3 years ago
- ☆352Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆853Updated 3 months ago
- Root shell PoC for CVE-2021-3156☆152Updated 3 years ago
- ☆146Updated 2 months ago
- A targeted DNS cache poisoner☆121Updated 2 years ago
- CVE-2022-0995 exploit☆497Updated 3 years ago