testanull / SharePoint-not-so-0day
☆16Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for SharePoint-not-so-0day
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆33Updated last year
- Slides from out talk at BH IL 2022☆27Updated 2 years ago
- ☆40Updated 2 years ago
- Apt style exploitation of Chrome 0day CVE-2023-4357☆43Updated last year
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆31Updated last year
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Updated last year
- ☆27Updated 7 months ago
- ☆57Updated last year
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Updated last year
- LPE of CVE-2024-26230☆20Updated 2 months ago
- POC for CLFS CVE-2022-24481☆12Updated last year
- ☆15Updated 2 years ago
- ☆45Updated 2 years ago
- ☆17Updated 3 years ago
- Exchange ProxyRelay POC☆36Updated 2 years ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Updated last year
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆77Updated 2 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆32Updated last year
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 2 years ago
- ZDI presentations, publications, whitepapers etc☆46Updated this week
- Collection of slides☆33Updated 7 months ago
- CVE-2024-37051 poc and exploit☆29Updated 5 months ago
- Windows Etw LPE☆50Updated 3 years ago
- ☆31Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆36Updated 2 years ago
- 一款基于James Forshaw的.NET Remoting反序列化工具升级版在TypeFilterLevel.Low模式无文件payload任意代码执行poc的开发心得☆28Updated 2 months ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆28Updated 2 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆32Updated 2 months ago