Pre-compiled builds for CVE-2021-4034
☆26Mar 30, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-2021-4034
Users that are interested in CVE-2021-4034 are comparing it to the libraries listed below
Sorting:
- string encryption in Nim☆20Jun 15, 2024Updated last year
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Exploits, Exploits, Exploits and more Exploits!☆34Nov 7, 2020Updated 5 years ago
- ☆31Dec 5, 2024Updated last year
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 2 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- BypassCredGuard CS BOF☆51Jan 23, 2025Updated last year
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Landscape Generator is An open Source web application that generates landscape drawings randomly, then gives you the ability to edit it a…☆10Jul 30, 2024Updated last year
- core shell functions building blocks for advanced AI pipelines☆15May 2, 2023Updated 2 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- ☆44Oct 16, 2023Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Reverse ip lookup tool written with go . Bing , Spyse , HackerTarget , ViewDns☆12May 14, 2022Updated 3 years ago
- Arch Linux sway/i3 setup on a System76 Oryx Pro 7☆11May 29, 2024Updated last year
- Zeek script library for getting the effective TLD of a domain.☆13Apr 12, 2024Updated last year
- more extensions for https://rpcx.io☆10Apr 11, 2021Updated 4 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- A library containing general purpose Python utils.☆14Feb 22, 2023Updated 3 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- Shorthand for web search based on each own query with dmenu.☆10Feb 19, 2022Updated 4 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Marlin Simulator UI☆15Feb 19, 2026Updated 2 weeks ago