efchatz / easy-exploits
Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)
☆17Updated 2 years ago
Alternatives and similar repositories for easy-exploits:
Users that are interested in easy-exploits are comparing it to the libraries listed below
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- some sploits☆17Updated 3 months ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 4 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- A custom SentinelOne USB scanner.☆18Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- ☆26Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆25Updated 6 months ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- ☆12Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Updated 10 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆21Updated 9 months ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- A collection of my presentation materials.☆16Updated 8 months ago
- Simple WebSocket fuzzer☆32Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year
- BLE based C2 for Hak5's Bash Bunny☆15Updated last year
- ASUS wifi router RCE vulnerability☆15Updated 4 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated last year
- ☆16Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆31Updated 7 months ago
- ☆18Updated last week