homjxi0e / PoC-ActiveX
PoC ActiveX SVG Document Execution
☆21Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for PoC-ActiveX
- ☆13Updated 9 years ago
- interesting analysis☆16Updated 6 years ago
- Abusing SketchUp to make persistence on Windows☆20Updated 5 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆30Updated 9 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- ☆54Updated 6 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Updated 6 years ago
- ☆45Updated 6 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- ☆13Updated 3 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆37Updated 6 years ago
- CVE-2019-12949☆26Updated 5 years ago
- Discover MSSQL Instances via UDP Scanning☆23Updated 5 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆42Updated 7 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Updated 6 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 4 years ago
- ☆11Updated 7 years ago
- Windows log and threat hunting with powershell☆16Updated 3 years ago
- Leak windows system info through a docx file☆12Updated 4 years ago
- Remote Desktop Protocol in Twisted Python☆26Updated 6 years ago
- Security Advisories☆10Updated 5 years ago
- Win32k Elevation of Privilege Poc☆0Updated 5 years ago