secnigma / CVE-2021-3560-Polkit-Privilege-EsclationLinks
☆120Updated 2 years ago
Alternatives and similar repositories for CVE-2021-3560-Polkit-Privilege-Esclation
Users that are interested in CVE-2021-3560-Polkit-Privilege-Esclation are comparing it to the libraries listed below
Sorting:
- ☆160Updated 3 years ago
- SSTI Payload Generator☆91Updated 2 years ago
- Aspx reverse shell☆110Updated 5 years ago
- Root shell PoC for CVE-2021-3156☆69Updated 4 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆310Updated last year
- ☆147Updated 2 years ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆143Updated last year
- generate payloads that force authentication against an attacker machine☆108Updated 2 years ago
- Squid Pivoting Open Port Scanner☆79Updated 7 months ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆125Updated 2 years ago
- ☆164Updated 3 months ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆143Updated last year
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- Precompiled executable☆59Updated 4 months ago
- GameOver(lay) Ubuntu Privilege Escalation☆128Updated last year
- Collection of username lists for enumerating kerberos domain users☆93Updated 7 years ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- Exploit for CVE-2021-3129☆66Updated 4 years ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆114Updated last year
- Password spraying tool and Bloodhound integration☆238Updated 6 months ago
- Python tool for enumerating directories and files on web servers that contain a publicly readable .ds_store file.☆62Updated 3 years ago
- ☆218Updated 4 years ago
- Python exploit code for CVE-2021-4034 (pwnkit)☆169Updated 3 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆130Updated 5 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94Updated 4 years ago
- CLI monitor for windows process- & file activity☆88Updated 4 years ago
- brute-forcing su for fun and possibly profit☆93Updated 6 years ago
- Kerberoast with ACL abuse capabilities☆512Updated 7 months ago
- Extracts Key Values from .keytab files☆286Updated 4 years ago
- Active Directory Labs/exams Review☆257Updated 4 years ago