vanhauser-thc / CVE-2021-26855
PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github
☆7Updated 4 years ago
Alternatives and similar repositories for CVE-2021-26855
Users that are interested in CVE-2021-26855 are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Scripts from Ghidra Golf competitions☆34Updated 2 years ago
- An opensource API hooking framework☆22Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Companion Worm research☆15Updated 3 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 4 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Updated 4 years ago
- ☆14Updated 3 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆64Updated 3 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆51Updated 2 years ago
- ARP Man-in-the-Middle tool☆29Updated 4 months ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- ☆48Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Another (bad) ROP gadget finder, but this time in Rust☆20Updated last year
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- ☆24Updated 3 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 3 years ago
- ☆11Updated 4 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆12Updated 4 years ago