CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation
☆23Feb 2, 2026Updated 3 months ago
Alternatives and similar repositories for cve-2021-34527
Users that are interested in cve-2021-34527 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 3 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated 3 months ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆83Feb 2, 2026Updated 3 months ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆26Feb 2, 2026Updated 3 months ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆51Feb 2, 2026Updated 3 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Papers, presentations and documents from the team at Hacker House.☆53Feb 2, 2026Updated 3 months ago
- AES-256 Microsoft Cryptography API Example Use.☆35Feb 2, 2026Updated 3 months ago
- Diebold Accuvote-TSx Election Machine Hacking☆41Feb 2, 2026Updated 3 months ago
- query specific user and login IP from remote machine☆18Nov 19, 2022Updated 3 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated 3 months ago
- Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with al…☆95Feb 2, 2026Updated 3 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated 3 months ago
- A collection of tools created for computer security research purposes.☆140Feb 2, 2026Updated 3 months ago
- cve-2018-10933 libssh authentication bypass☆110Feb 2, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆21Jan 28, 2021Updated 5 years ago
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆14Oct 17, 2023Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 9 months ago
- Enable RDP and set firewall by Windows API.☆21Mar 3, 2022Updated 4 years ago
- ☆132Oct 14, 2022Updated 3 years ago
- ☆162Jun 18, 2023Updated 2 years ago
- Proof-of-Concept for CVE-2024-26218☆56Apr 26, 2024Updated 2 years ago
- UAC bypass for x64 Windows 7 - 11☆840Feb 2, 2026Updated 3 months ago
- ☆11Aug 8, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- APKnife is an advanced APK analysis and modification tool designed for security researchers and ethical hackers. It allows users to extra…☆17Mar 13, 2025Updated last year
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆182Feb 2, 2026Updated 3 months ago
- ☆12Apr 17, 2017Updated 9 years ago
- QR designer web app with a novel method of designing qr codes that does not take advantage of error correction☆10Sep 24, 2024Updated last year
- A generator of weird files (binary polyglots, near polyglots...)☆15Sep 24, 2024Updated last year
- ☆13Feb 25, 2023Updated 3 years ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆113Jan 17, 2024Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆101Mar 20, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Mar 4, 2023Updated 3 years ago
- A little tool to play with Windows security☆12Jan 21, 2026Updated 3 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Shellcode execution for memflow☆13Apr 11, 2022Updated 4 years ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆322Feb 2, 2026Updated 3 months ago
- Some sample codes for blog article☆13Sep 15, 2022Updated 3 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆147Aug 16, 2021Updated 4 years ago