irsl / google-osconfig-privesc
Proof of concept about the privilege escalation flaw identified in Google's Osconfig
☆10Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for google-osconfig-privesc
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 6 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- Yet another powerful payload encoder/decoder☆12Updated 2 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- Noob Penetration tester☆10Updated 6 months ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆19Updated 3 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 6 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A productivity burp extension which reminds to take break while you are at work!☆17Updated 4 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆13Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago