CVE-2020-5837 exploit
☆43May 13, 2020Updated 5 years ago
Alternatives and similar repositories for SEP-14.2-Arbitrary-Write
Users that are interested in SEP-14.2-Arbitrary-Write are comparing it to the libraries listed below
Sorting:
- ☆21Dec 1, 2019Updated 6 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- 绕过火绒剑检测的一个简单的inlinehook方法☆12Mar 10, 2019Updated 6 years ago
- ☆14Sep 2, 2021Updated 4 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Jun 25, 2020Updated 5 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- A quick tool for hiding a new process running shellcode.☆57Jun 10, 2020Updated 5 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE☆62Jun 1, 2023Updated 2 years ago
- ☆13Oct 12, 2017Updated 8 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆481Nov 11, 2021Updated 4 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- ☆15Nov 3, 2023Updated 2 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- ☆17Feb 29, 2020Updated 6 years ago