Cisco RV110w UPnP stack overflow
☆28Sep 30, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-34730
Users that are interested in CVE-2021-34730 are comparing it to the libraries listed below
Sorting:
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Process Hollowing Packer☆29Sep 5, 2017Updated 8 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- Custom pentesting tools☆26Nov 17, 2020Updated 5 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- Write your own exploit for $CASH☆26Jun 16, 2022Updated 3 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- ☆13Oct 12, 2017Updated 8 years ago
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Jun 19, 2019Updated 6 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 6 months ago
- ☆14Sep 22, 2019Updated 6 years ago
- Using "svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc" as trigger☆58Oct 7, 2020Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- C-based Reverse Shell that uses CMD or PowerShell☆16Aug 15, 2020Updated 5 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Aug 15, 2023Updated 2 years ago
- 稳定多线程中的inline hook☆16Jun 19, 2019Updated 6 years ago
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 6 months ago