ZephrFish / CVE-2021-28480_HoneyPoC3View external linksLinks
DO NOT RUN THIS.
☆10Jul 15, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-28480_HoneyPoC3
Users that are interested in CVE-2021-28480_HoneyPoC3 are comparing it to the libraries listed below
Sorting:
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 5 years ago
- 一款支持高度自定义的 Java 内存马生成工具☆14Aug 26, 2025Updated 5 months ago
- Various shell code I have written☆17Oct 9, 2020Updated 5 years ago
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆21Jul 3, 2024Updated last year
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆23Jan 17, 2024Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last week
- Some useful test data or payloads☆24Oct 30, 2021Updated 4 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Nov 6, 2022Updated 3 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆25Feb 13, 2022Updated 4 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Feb 7, 2022Updated 4 years ago
- CTF中那些脑洞大开的编码和加密☆30Jun 4, 2017Updated 8 years ago
- Tool for extracting credentials locally stored by web browsers☆37Jun 25, 2022Updated 3 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46May 3, 2021Updated 4 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- YSOSERIAL Integration with burp suite☆41Feb 10, 2022Updated 4 years ago
- ☆160Feb 8, 2025Updated last year
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33May 28, 2019Updated 6 years ago
- Iot BeeHive Monitoring using Balena.io☆12Mar 7, 2022Updated 3 years ago
- ☆12Nov 23, 2025Updated 2 months ago
- Digital Identity and Blockchain☆10May 19, 2018Updated 7 years ago
- Powershell script to include in your SharePoint Framework solution which allows having an automated deployment http://www.delucagiuliano.…☆10Jan 12, 2018Updated 8 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 7 months ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- Basic C# Project that will take an MSBuild payload and run it with MSBuild via ClickOnce.☆93Oct 24, 2020Updated 5 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- nuclei scanner for proxyshell ( CVE-2021-34473 )☆47Oct 9, 2022Updated 3 years ago
- justCTF 2019 challenges sources☆41Jun 9, 2021Updated 4 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago