cyberark / conjur-templateLinks
Template repo for Conjur repositories
☆17Updated 3 years ago
Alternatives and similar repositories for conjur-template
Users that are interested in conjur-template are comparing it to the libraries listed below
Sorting:
- CVE-2019-12949☆26Updated 6 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 5 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Updated 5 years ago
- ☆27Updated 5 years ago
- ☆21Updated 5 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- ☆50Updated 5 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- ☆35Updated 2 years ago
- ☆50Updated 6 years ago
- PoC for CVE-2020-1015☆39Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- ☆16Updated 5 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 3 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 5 years ago
- Windows 10 Exploit☆30Updated 7 years ago
- This repository contains some details about abusing outlook.☆27Updated 7 years ago
- ☆21Updated 6 years ago
- CVE-2020-12828 PoC and Analysis.☆29Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Updated 7 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Updated 6 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.☆32Updated 5 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- sploit☆67Updated 5 years ago
- with metasploit☆63Updated 5 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Updated 5 years ago