POC for CVE-2021-41091
☆66May 20, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2021-41091
Users that are interested in CVE-2021-41091 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad☆28Jan 14, 2023Updated 3 years ago
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- ☆11Nov 17, 2025Updated 5 months ago
- Demo of a malicious python package that will run code upon pip download or install☆29Sep 10, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Feb 12, 2026Updated 2 months ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 3 years ago
- Bypass Malware Sandbox Evasion Ram check☆139Jan 3, 2023Updated 3 years ago
- BOF内存运行exe☆32Jun 19, 2023Updated 2 years ago
- Original PoC for CVE-2023-32784☆650Aug 17, 2023Updated 2 years ago
- A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks☆31Mar 17, 2026Updated last month
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- Proof-of-Concept for Server Side Request Forgery (SSRF) in request-baskets (<= v.1.2.1)☆30Aug 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple x86 Trampoline Hook☆44Aug 3, 2022Updated 3 years ago
- simple tester for push swap 42 project☆14Jun 20, 2022Updated 3 years ago
- CVE-2023-0386在ubuntu22.04上的提权☆417Jun 13, 2023Updated 2 years ago
- Gadget IoC removal from HAK5's BashBunny☆21Aug 10, 2023Updated 2 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Stop Windows Defender programmatically☆15Jan 17, 2022Updated 4 years ago
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- A docker image contains tools for developing and debuging your 42 projects.☆22Mar 25, 2022Updated 4 years ago
- ☆11Jun 19, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- ☆15Apr 6, 2025Updated last year
- BnademOverFlow's Official Website☆36Mar 6, 2023Updated 3 years ago
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆11Jun 19, 2024Updated last year
- Bypass Malware Time Delays☆105Sep 23, 2022Updated 3 years ago
- ☆17Nov 12, 2019Updated 6 years ago
- a collection of elf file infectors☆27Oct 10, 2021Updated 4 years ago
- ☆17Feb 17, 2022Updated 4 years ago
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆174Apr 27, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 3 months ago
- ☆25Jul 11, 2022Updated 3 years ago
- 红帆OA iOffice.net udfmr.asmx接口处存在SQL注入漏洞☆12Jun 16, 2023Updated 2 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 3 years ago
- VMware Aria Operations for Logs CVE-2023-34051☆61Oct 20, 2023Updated 2 years ago
- Modified version of Pypykatz to print encrypted credentials☆56Dec 26, 2022Updated 3 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆20Jul 14, 2022Updated 3 years ago