GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-4034 PoC , polkit < 0.120
URL:https://github.com/tahaafarooq/poppy
更新了:CVE-2021
描述:CVE-2021-4034 PoC , polkit < 0.120
URL:https://github.com/tahaafarooq/poppy
GitHub
GitHub - tahaafarooq/poppy: CVE-2021-4034 PoC , polkit < 0.131
CVE-2021-4034 PoC , polkit < 0.131. Contribute to tahaafarooq/poppy development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Proof of Concept for CVE-2021-4034
URL:https://github.com/DosAmp/pkwned
更新了:CVE-2021
描述:Proof of Concept for CVE-2021-4034
URL:https://github.com/DosAmp/pkwned
GitHub
GitHub - DosAmp/pkwned: Proof of Concept for CVE-2021-4034 (with experimental traceless exploitation)
Proof of Concept for CVE-2021-4034 (with experimental traceless exploitation) - GitHub - DosAmp/pkwned: Proof of Concept for CVE-2021-4034 (with experimental traceless exploitation)
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Pre-compiled builds for CVE-2021-4034
URL:https://github.com/c3c/CVE-2021-4034
更新了:CVE-2021
描述:Pre-compiled builds for CVE-2021-4034
URL:https://github.com/c3c/CVE-2021-4034
GitHub
GitHub - c3c/CVE-2021-4034: Pre-compiled builds for CVE-2021-4034
Pre-compiled builds for CVE-2021-4034. Contribute to c3c/CVE-2021-4034 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Exploit for pkexec (CVE-2021-4034)
URL:https://github.com/Fato07/Pwnkit-exploit
更新了:CVE-2021
描述:Exploit for pkexec (CVE-2021-4034)
URL:https://github.com/Fato07/Pwnkit-exploit
GitHub
GitHub - Fato07/Pwnkit-exploit: Exploit for pkexec (CVE-2021-4034)
Exploit for pkexec (CVE-2021-4034) . Contribute to Fato07/Pwnkit-exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Single shell script to download and make berdav CVE-2021-4034 polkit exploit and see if your system is affected
URL:https://github.com/10100programer/CVE-2021-4034-Quick-Check
更新了:CVE-2021
描述:Single shell script to download and make berdav CVE-2021-4034 polkit exploit and see if your system is affected
URL:https://github.com/10100programer/CVE-2021-4034-Quick-Check
GitHub
GitHub - 10100programer/CVE-2021-4034-Quick-Check: Single shell script to download and make berdav CVE-2021-4034 polkit exploit…
Single shell script to download and make berdav CVE-2021-4034 polkit exploit and see if your system is affected - GitHub - 10100programer/CVE-2021-4034-Quick-Check: Single shell script to download ...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:An exploit for CVE-2021-4034 aka Pwnkit: Local Privilege Escalation in polkit's pkexec
URL:https://github.com/whokilleddb/CVE-2021-4034
更新了:CVE-2021
描述:An exploit for CVE-2021-4034 aka Pwnkit: Local Privilege Escalation in polkit's pkexec
URL:https://github.com/whokilleddb/CVE-2021-4034
GitHub
GitHub - whokilleddb/CVE-2021-4034: An exploit for CVE-2021-4034 aka Pwnkit: Local Privilege Escalation in polkit's pkexec
An exploit for CVE-2021-4034 aka Pwnkit: Local Privilege Escalation in polkit's pkexec - GitHub - whokilleddb/CVE-2021-4034: An exploit for CVE-2021-4034 aka Pwnkit: Local Privilege Escalat...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
URL:https://github.com/Pa1ntex/Classic-Gui---Saktkia51-Script-op-
更新了:Red Team
描述:Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
URL:https://github.com/Pa1ntex/Classic-Gui---Saktkia51-Script-op-
GitHub
Pa1ntex/Classic-Gui---Saktkia51-Script-op-
local b=game:GetService("Players")local c=game:GetService("ReplicatedStorage")local d=game:GetService("StarterGui")local e=game:GetService(&...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team vs. Blue Team
URL:https://github.com/paulbarr77/Red-Team-vs.-Blue-Team
更新了:Red Team
描述:Red Team vs. Blue Team
URL:https://github.com/paulbarr77/Red-Team-vs.-Blue-Team
GitHub
GitHub - paulbarr77/Red-Team-vs.-Blue-Team: Red Team vs. Blue Team
Red Team vs. Blue Team. Contribute to paulbarr77/Red-Team-vs.-Blue-Team development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-4034 POC exploit
URL:https://github.com/PeterGottesman/pwnkit-exploit
更新了:CVE-2021
描述:CVE-2021-4034 POC exploit
URL:https://github.com/PeterGottesman/pwnkit-exploit
GitHub
GitHub - PeterGottesman/pwnkit-exploit: CVE-2021-4034 POC exploit
CVE-2021-4034 POC exploit. Contribute to PeterGottesman/pwnkit-exploit development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Exploit for the PwnKit vulnerability, CVE-2021-4034
URL:https://github.com/jpmcb/pwnkit-go
更新了:CVE-2021
描述:Exploit for the PwnKit vulnerability, CVE-2021-4034
URL:https://github.com/jpmcb/pwnkit-go
GitHub
jpmcb/pwnkit-go
Exploit for the PwnKit vulnerability, CVE-2021-4034 - jpmcb/pwnkit-go
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-4034 - One line in the terminal for an instant priv esc to boxes that are vulnerable. See usage.
URL:https://github.com/n3onhacks/CVE-2021-4034-BASH-One-File-Exploit
更新了:CVE-2021
描述:CVE-2021-4034 - One line in the terminal for an instant priv esc to boxes that are vulnerable. See usage.
URL:https://github.com/n3onhacks/CVE-2021-4034-BASH-One-File-Exploit
GitHub
GitHub - n3onhacks/CVE-2021-4034-BASH-One-File-Exploit: CVE-2021-4034 - One line in the terminal for an instant priv esc to boxes…
CVE-2021-4034 - One line in the terminal for an instant priv esc to boxes that are vulnerable. See usage. - GitHub - n3onhacks/CVE-2021-4034-BASH-One-File-Exploit: CVE-2021-4034 - One line in the t...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:vulnerable setup to display an attack chain of log4j CVE-2021-44228 with privilege escalation to root using the polkit exploit CVE-2021-4034
URL:https://github.com/0xalwayslucky/log4j-polkit-poc
更新了:CVE-2021
描述:vulnerable setup to display an attack chain of log4j CVE-2021-44228 with privilege escalation to root using the polkit exploit CVE-2021-4034
URL:https://github.com/0xalwayslucky/log4j-polkit-poc
GitHub
GitHub - 0xalwayslucky/log4j-polkit-poc: vulnerable setup to display an attack chain of log4j CVE-2021-44228 with privilege escalation…
vulnerable setup to display an attack chain of log4j CVE-2021-44228 with privilege escalation to root using the polkit exploit CVE-2021-4034 - GitHub - 0xalwayslucky/log4j-polkit-poc: vulnerable se...
GitHub监控消息提醒!!!
更新了:Red Team
描述:The all-in-one Red Team extension for Web Pentester 🛠
URL:https://github.com/LasCC/Hack-Tools
更新了:Red Team
描述:The all-in-one Red Team extension for Web Pentester 🛠
URL:https://github.com/LasCC/Hack-Tools
GitHub
GitHub - LasCC/HackTools: The all-in-one browser extension for offensive security professionals 🛠
The all-in-one browser extension for offensive security professionals 🛠 - LasCC/HackTools
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)
URL:https://github.com/Pr0f3ssor/CVE-2021-4034
更新了:CVE-2021
描述:PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)
URL:https://github.com/Pr0f3ssor/CVE-2021-4034
GitHub
GitHub - Pr0f3ssor/CVE-2021-4034-Pwnkit: PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021…
PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034) - GitHub - Pr0f3ssor/CVE-2021-4034-Pwnkit: PoC for PwnKit: Local Privilege Escalation Vulnerability in po...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034
URL:https://github.com/Kirill89/CVE-2021-4034
更新了:CVE-2021
描述:pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034
URL:https://github.com/Kirill89/CVE-2021-4034
GitHub
GitHub - Kirill89/CVE-2021-4034: pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034
pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034 - GitHub - Kirill89/CVE-2021-4034: pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation
URL:https://github.com/Rvn0xsy/CVE-2021-4034
更新了:CVE-2021
描述:CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation
URL:https://github.com/Rvn0xsy/CVE-2021-4034
GitHub
GitHub - Rvn0xsy/CVE-2021-4034: CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation
CVE-2021-4034 Add Root User - Pkexec Local Privilege Escalation - Rvn0xsy/CVE-2021-4034
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:centos 6.10的rpm包,修复CVE-2021-4034 漏洞
URL:https://github.com/sofire/polkit-0.96-CVE-2021-4034
更新了:CVE-2021
描述:centos 6.10的rpm包,修复CVE-2021-4034 漏洞
URL:https://github.com/sofire/polkit-0.96-CVE-2021-4034
GitHub
GitHub - sofire/polkit-0.96-CVE-2021-4034: centos 6.10 rpm for fix polkit CVE-2021-4034; centos 6.10的rpm包,修复CVE-2021-4034 漏洞
centos 6.10 rpm for fix polkit CVE-2021-4034; centos 6.10的rpm包,修复CVE-2021-4034 漏洞 - GitHub - sofire/polkit-0.96-CVE-2021-4034: centos 6.10 rpm for fix polkit CVE-2021-4034; centos 6.10的rpm包,修复C...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Check CVE-2021-4034 vulnerability
URL:https://github.com/codiobert/pwnkit-scanner
更新了:CVE-2021
描述:Check CVE-2021-4034 vulnerability
URL:https://github.com/codiobert/pwnkit-scanner
GitHub
GitHub - codiobert/pwnkit-scanner: Check CVE-2021-4034 vulnerability
Check CVE-2021-4034 vulnerability. Contribute to codiobert/pwnkit-scanner development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createFromParcel` serialization mismatch in `OutputConfiguration`
URL:https://github.com/michalbednarski/ReparcelBug2
更新了:CVE-2021
描述:Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createFromParcel` serialization mismatch in `OutputConfiguration`
URL:https://github.com/michalbednarski/ReparcelBug2
GitHub
GitHub - michalbednarski/ReparcelBug2: Writeup and exploit for installed app to system privilege escalation on Android 12 Beta…
Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`/`createFromParcel` serialization mismatch in `OutputConfiguration` -...
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:Log4j 1.2 project, stripped of the additional appenders and CVEs that cause problems (CVE-2019-17571, CVE-2020-9488, CVE-2021-4104, CVE-2022-23302, CVE-2022-23305 and CVE-2022-23307)
URL:https://github.com/Schnitker/log4j-min
更新了:CVE-2021
描述:Log4j 1.2 project, stripped of the additional appenders and CVEs that cause problems (CVE-2019-17571, CVE-2020-9488, CVE-2021-4104, CVE-2022-23302, CVE-2022-23305 and CVE-2022-23307)
URL:https://github.com/Schnitker/log4j-min
GitHub
GitHub - Schnitker/log4j-min: Fork of Log4j 1.2 project, without additional appenders and classes causing security issues.
Fork of Log4j 1.2 project, without additional appenders and classes causing security issues. - GitHub - Schnitker/log4j-min: Fork of Log4j 1.2 project, without additional appenders and classes caus...