sunn1day / CVE-2020-36109-POCLinks
CVE-2020-36109 PoC causing DoS
☆18Updated 3 years ago
Alternatives and similar repositories for CVE-2020-36109-POC
Users that are interested in CVE-2020-36109-POC are comparing it to the libraries listed below
Sorting:
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 5 years ago
- Containing vulnerabilities I've discovered and maybe CVE☆19Updated 2 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Jar2Exe extraction tool☆15Updated 2 years ago
- ☆17Updated 2 years ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- TightVNC Vulnerability.☆16Updated 3 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 3 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Updated 3 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- A collection of various exploits☆29Updated last year
- Execute Mimikatz with different technique☆51Updated 4 years ago
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- Mimikatz built as a static library.☆12Updated 3 years ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆26Updated 3 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- Reverse shell macro using Word VBA☆16Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago