c3c / CVE-2021-4034
Pre-compiled builds for CVE-2021-4034
☆25Updated 3 years ago
Alternatives and similar repositories for CVE-2021-4034:
Users that are interested in CVE-2021-4034 are comparing it to the libraries listed below
- SeManageVolumePrivilege to SYSTEM☆98Updated last year
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆21Updated 3 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆56Updated 2 years ago
- AV EVASION TECHNIQUES☆79Updated 2 years ago
- ☆67Updated last month
- CLI monitor for windows process- & file activity☆85Updated 4 years ago
- ☆90Updated 2 months ago
- rcat☆67Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆57Updated last year
- QuoteDB (Vulnerable TCP Server)☆70Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 3 months ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- ☆58Updated last year
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- ☆48Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆20Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆90Updated 11 months ago
- ☆110Updated last year
- SeRestorePrivilege to SYSTEM☆106Updated 3 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- Loads a custom dll in system32 via diaghub.☆72Updated 5 years ago
- A collection of code snippets built to assist with breaking chains.☆117Updated last year
- ☆77Updated 5 years ago
- ☆29Updated 2 years ago
- Payload Generation Framework☆91Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated 10 months ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 3 years ago