secnigma / CVE-2021-3560-Polkit-Privilege-EsclationLinks
☆125Updated 2 years ago
Alternatives and similar repositories for CVE-2021-3560-Polkit-Privilege-Esclation
Users that are interested in CVE-2021-3560-Polkit-Privilege-Esclation are comparing it to the libraries listed below
Sorting:
- ☆163Updated 3 years ago
- Root shell PoC for CVE-2021-3156☆70Updated 4 years ago
- SSTI Payload Generator☆92Updated 3 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆157Updated last year
- Aspx reverse shell☆118Updated 5 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆342Updated last year
- Squid Pivoting Open Port Scanner☆88Updated 11 months ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆62Updated 2 years ago
- Python exploit code for CVE-2021-4034 (pwnkit)☆171Updated 3 years ago
- Script to retrieve the master password of a keepass database <= 2.53.1☆113Updated last year
- POC for CVE-2021-41091☆65Updated 2 years ago
- GameOver(lay) Ubuntu Privilege Escalation☆130Updated 2 years ago
- generate payloads that force authentication against an attacker machine☆114Updated 3 years ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆126Updated last year
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆141Updated 6 years ago
- ☆183Updated 7 months ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆153Updated last year
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆23Updated 3 years ago
- brute-forcing su for fun and possibly profit☆97Updated 6 years ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆154Updated 3 months ago
- ☆167Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆103Updated 7 years ago
- Exploit for CVE-2021-3129☆68Updated 4 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- A tool for mapping cypher databases☆16Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆156Updated 3 years ago
- Password spraying tool and Bloodhound integration☆247Updated 10 months ago
- Active Directory Labs/exams Review☆260Updated 4 years ago
- ☆49Updated last year