jonathandata1 / 2022_beijing
☆302Updated this week
Related projects: ⓘ
- Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation☆1,050Updated 2 years ago
- PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)☆1,046Updated last year
- NMAP Vulnerability Scanning Scripts☆624Updated 2 years ago
- CVE-2021-4034 1day☆1,950Updated 2 years ago
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆314Updated 2 years ago
- win32k LPE☆457Updated 2 years ago
- Shellcode injection technique. Given as C++ header, standalone Rust program or library.☆684Updated 11 months ago
- Nginx 18.1 04/09/22 zero-day repo☆367Updated 2 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆825Updated 3 years ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆827Updated last year
- An open letter against Apple's new privacy-invasive client-side content scanning.☆636Updated last year
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,085Updated 2 years ago
- A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities☆655Updated 2 years ago
- A special DOS application to stop pro-Russian aggression websites. Support Ukraine!☆449Updated 2 years ago
- CVE-2022-0995 exploit☆492Updated 2 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆531Updated 3 years ago
- log4j rce test environment and poc☆309Updated 2 years ago
- ☆360Updated last year
- Detector for Log4Shell exploitation attempts☆729Updated 2 years ago
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆688Updated 2 years ago
- Kernel exploitation technique☆561Updated 10 months ago
- Watch classic spongebob from the terminal! 🎥🧽☆570Updated 10 months ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆910Updated last year
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆862Updated 2 years ago
- Trojan Source: Invisible Vulnerabilities☆1,232Updated last year
- Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)☆435Updated last year
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,551Updated 11 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,824Updated 11 months ago
- ☆265Updated this week
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆775Updated last year