secnigma / CVE-2021-3560-Polkit-Privilege-Esclation
☆111Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2021-3560-Polkit-Privilege-Esclation
- Aspx reverse shell☆93Updated 4 years ago
- Root shell PoC for CVE-2021-3156☆62Updated 3 years ago
- SSTI Payload Generator☆88Updated 2 years ago
- ☆154Updated 2 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆69Updated 3 years ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆127Updated 4 months ago
- generate payloads that force authentication against an attacker machine☆93Updated 2 years ago
- POC for CVE-2021-41091☆65Updated last year
- Privilege escalation with polkit - CVE-2021-3560☆115Updated 3 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆72Updated 3 years ago
- Active Directory Labs/exams Review☆242Updated 3 years ago
- Certified Red Team Operator☆195Updated 2 years ago
- CLI monitor for windows process- & file activity☆77Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆67Updated 3 months ago
- Exploit for CVE-2021-3129☆65Updated 3 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆89Updated 3 years ago
- TUDO - A vulnerable PHP Web Application.☆98Updated last year
- ☆134Updated last year
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆113Updated 5 years ago
- ☆45Updated 5 months ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆57Updated last year
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆90Updated 3 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆115Updated last year
- Simple HTTP listener for security testing☆114Updated last year
- Python exploit code for CVE-2021-4034 (pwnkit)☆155Updated 2 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆52Updated 2 years ago
- Precompiled executable☆37Updated last year
- Collection of username lists for enumerating kerberos domain users☆81Updated 6 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆244Updated 9 months ago