corelight / CVE-2021-31166
HTTP Protocol Stack CVE-2021-31166
☆13Updated 3 months ago
Alternatives and similar repositories for CVE-2021-31166:
Users that are interested in CVE-2021-31166 are comparing it to the libraries listed below
- Show AV Processes list☆14Updated 4 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆30Updated 4 years ago
- TrojanDropper/PS.Maloader.d☆12Updated 3 years ago
- ☆21Updated 4 years ago
- Cobalt Strike DNS beacon parser☆11Updated 3 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆32Updated 4 months ago
- inject shellcode into remote process via message hook☆15Updated 4 years ago
- SyscallLoader☆10Updated 3 years ago
- Use current thread token to execute command☆15Updated 3 years ago
- ☆19Updated 3 years ago
- RCE Exploit for Gitlab < 13.9.4☆51Updated 3 years ago
- Source code RDPUploader☆19Updated 6 years ago
- Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack☆26Updated 3 years ago
- ☆13Updated last year
- ☆15Updated 4 years ago
- RCE in NPM VSCode Extension☆20Updated 3 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆43Updated last year
- 寻找可注入进程☆13Updated 4 years ago
- ☆27Updated 3 years ago
- ☆11Updated 2 years ago
- 获取系统KB补丁对于的MS号☆24Updated 5 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Updated 4 years ago
- CVE-2020-10204 远程命令执行脚本☆13Updated 4 years ago