SpiralBL0CK / Chrome-V8-RCE-CVE-2021-38003
CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224
☆34Updated 2 years ago
Alternatives and similar repositories for Chrome-V8-RCE-CVE-2021-38003:
Users that are interested in Chrome-V8-RCE-CVE-2021-38003 are comparing it to the libraries listed below
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- 一款基于James Forshaw的.NET Remoting反序列化工具升级版在TypeFilterLevel.Low模式无文件payload任意代码执行poc的开发心得☆45Updated 2 months ago
- ☆16Updated 11 months ago
- ☆15Updated 2 years ago
- POC for CLFS CVE-2022-24481☆13Updated last year
- Poc of CVE-2022-22980☆32Updated 2 years ago
- ☆40Updated 3 years ago
- ☆31Updated 2 years ago
- Exchange ProxyRelay POC☆38Updated 2 years ago
- Research analysis☆57Updated 4 months ago
- Windows Etw LPE☆50Updated 3 years ago
- CVE-2021-42342 RCE☆42Updated 3 years ago
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆33Updated last year
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Updated 2 years ago
- dump lsass tool☆39Updated 2 years ago
- RCE Exploit for Gitlab < 13.9.4☆51Updated 3 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆22Updated 2 years ago
- redshift-jdbc-RCE proof☆1Updated 2 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆32Updated 2 years ago
- ☆45Updated 2 years ago
- ☆40Updated last year
- CVE-2024-37051 poc and exploit☆30Updated 9 months ago
- Multithreaded exploit script for CVE-2022-36804 affecting BitBucket versions <8.3.1☆18Updated 2 years ago
- UAC_wenpon☆48Updated 3 years ago
- Py写的tsh的流量加解密过程。☆28Updated 2 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Updated 8 months ago
- ☆18Updated 2 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year