berdav / CVE-2021-4034Links
CVE-2021-4034 1day
☆2,019Updated 3 years ago
Alternatives and similar repositories for CVE-2021-4034
Users that are interested in CVE-2021-4034 are comparing it to the libraries listed below
Sorting:
- PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)☆1,109Updated 2 years ago
- Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation☆1,236Updated 3 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,119Updated 3 years ago
- ☆994Updated 4 years ago
- Sudo Baron Samedit Exploit☆778Updated 3 years ago
- POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes☆1,145Updated 2 years ago
- A malicious LDAP server for JNDI injection attacks☆1,066Updated 2 years ago
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆685Updated 3 years ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,423Updated 7 months ago
- ☆2,506Updated 2 years ago
- JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)☆2,757Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,626Updated 4 months ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,936Updated 4 years ago
- Log4j2 RCE Passive Scanner plugin for BurpSuite☆826Updated 2 years ago
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆955Updated 3 years ago
- A Proof-Of-Concept for the CVE-2021-44228 vulnerability.☆1,841Updated last year
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,170Updated 2 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆932Updated last month
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆645Updated 2 years ago
- Codebase to generate an msdt-follina payload☆1,625Updated 3 years ago
- ☆3,607Updated 9 months ago
- Next-Generation Linux Kernel Exploit Suggester☆1,944Updated 2 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,218Updated 2 years ago
- ☆927Updated 2 years ago
- Apache Log4j 远程代码执行☆84Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆1,385Updated 3 years ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆3,231Updated 2 months ago
- ☆2,084Updated last year
- NMAP Vulnerability Scanning Scripts☆627Updated 3 years ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,349Updated this week