☆54Feb 25, 2021Updated 5 years ago
Alternatives and similar repositories for CVE-2021-21972
Users that are interested in CVE-2021-21972 are comparing it to the libraries listed below
Sorting:
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 7 months ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Jul 23, 2024Updated last year
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- ☆137Mar 1, 2021Updated 5 years ago
- Apache Solr SSRF(CVE-2021-27905)☆71Apr 21, 2021Updated 4 years ago
- Google Maps API checker☆79Feb 26, 2026Updated last week
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 6 years ago
- Integrate GoKart security static analysis to GitHub Actions☆10Jan 11, 2023Updated 3 years ago
- CVE-2020-10204 远程命令执行脚本☆13May 27, 2020Updated 5 years ago
- Fraud prevention tool☆28Aug 9, 2020Updated 5 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Dec 11, 2020Updated 5 years ago
- Study about HQL injection exploitation.☆51May 15, 2016Updated 9 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- ☆105Oct 18, 2020Updated 5 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- PowerShell script to create reports of M365 User Multi-factor Authentication Registration Status and Highlight MFA Related Conditional Ac…☆14May 17, 2024Updated last year
- PoC for DHCP vulnerability (NAME:WRECK) in FreeBSD☆15Apr 14, 2021Updated 4 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 4 months ago
- Proof of Concept Exploit for vCenter CVE-2021-21972☆271Feb 25, 2021Updated 5 years ago
- ☆205Apr 26, 2021Updated 4 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Mar 2, 2022Updated 4 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆828Jun 12, 2021Updated 4 years ago
- ☆214Jan 19, 2023Updated 3 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windows☆14Jan 31, 2025Updated last year