cyberark / conjur-templateLinks
Template repo for Conjur repositories
☆17Updated 3 years ago
Alternatives and similar repositories for conjur-template
Users that are interested in conjur-template are comparing it to the libraries listed below
Sorting:
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- ☆21Updated 5 years ago
- ☆17Updated 4 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- CVE-2019-12949☆26Updated 5 years ago
- Experiments on the Windows Internals☆30Updated 5 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- ☆14Updated 5 years ago
- PoC for CVE-2020-1015☆40Updated 5 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239☆23Updated 4 years ago
- PoC for CVE-2020-11651☆6Updated 5 years ago
- Example of async client/server sockets in .NET 5☆17Updated 4 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- ☆15Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 5 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- ☆12Updated 3 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- Create COM Objects backed by Scripts, not DLLs☆9Updated 7 years ago
- Security Research☆36Updated 3 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 3 years ago