horizon3ai / CVE-2021-38647View external linksLinks
Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)
☆233Sep 16, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-38647
Users that are interested in CVE-2021-38647 are comparing it to the libraries listed below
Sorting:
- RCE 0-day for GhostScript 9.50 - Payload generator☆544Sep 8, 2021Updated 4 years ago
- ☆385Aug 19, 2021Updated 4 years ago
- CVE-2021-40444 PoC☆1,712Dec 25, 2021Updated 4 years ago
- ☆153May 26, 2022Updated 3 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit☆823Oct 11, 2023Updated 2 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆937Sep 2, 2025Updated 5 months ago
- Run Powershell without software restrictions.☆281Sep 8, 2021Updated 4 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Aug 4, 2021Updated 4 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,437Dec 18, 2022Updated 3 years ago
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,088Jul 5, 2021Updated 4 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆327Mar 9, 2022Updated 3 years ago
- ☆1,201Sep 2, 2022Updated 3 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,962Jul 20, 2021Updated 4 years ago
- Hide your payload in DNS☆617May 3, 2023Updated 2 years ago
- Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.☆149May 11, 2022Updated 3 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆213Jan 16, 2022Updated 4 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆863Mar 20, 2023Updated 2 years ago
- Grafana Unauthorized arbitrary file reading vulnerability☆367Feb 14, 2023Updated 3 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆1,040Jul 10, 2022Updated 3 years ago
- Zimbra RCE simple poc☆66Aug 13, 2022Updated 3 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆503May 16, 2023Updated 2 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆259Mar 6, 2025Updated 11 months ago
- ☆121Jun 17, 2022Updated 3 years ago
- ☆205Apr 26, 2021Updated 4 years ago
- POC for VMWARE CVE-2022-22954☆282Apr 13, 2022Updated 3 years ago
- win32k LPE☆465Jan 27, 2022Updated 4 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- CVE-2021-1675 Detection Info☆215May 20, 2023Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- ☆477Nov 20, 2022Updated 3 years ago
- cve-2020-0688☆330Jul 4, 2023Updated 2 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆817Dec 14, 2023Updated 2 years ago
- C# Lsass parser☆296Oct 13, 2021Updated 4 years ago
- ☆1,376Jul 2, 2020Updated 5 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆276Jan 13, 2022Updated 4 years ago