ozergoker / CVE-2021-40444
Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444
☆17Updated 3 years ago
Alternatives and similar repositories for CVE-2021-40444:
Users that are interested in CVE-2021-40444 are comparing it to the libraries listed below
- Use current thread token to execute command☆15Updated 3 years ago
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 4 years ago
- redteam Build platform☆19Updated last year
- Cobalt Strike teamserver detection.☆16Updated 3 years ago
- Java XMLDecoder payload generator☆15Updated 3 years ago
- Post-exploitation script developed using impacket☆21Updated 2 years ago
- VEH hook☆10Updated 2 years ago
- ☆15Updated 4 years ago
- CobaltStrike Extentions☆38Updated 3 years ago
- SSRF 绕过 Payload☆15Updated 4 years ago
- Windows 7/2008 R2 EoP☆13Updated 3 years ago
- Cs-Sleep-Mask-Fiber☆17Updated 4 months ago
- Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack☆26Updated 3 years ago
- change domain machine password locally or remotely☆9Updated 3 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆10Updated 2 years ago
- CVE-2019-1040 with Kerberos delegation☆32Updated 3 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Updated 3 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Updated 2 years ago
- This contains a bundle with an executable to exploit ms17-010 remote or locally. It does not require Python.☆15Updated 6 years ago
- DPX工具界面展示☆13Updated 2 years ago
- Tool to get NT system shell .☆24Updated 3 years ago