VoidSec/CVE-2020-1472
Exploit Code for CVE-2020-1472 aka Zerologon
Language: Python
#cve_2020 #exploit #n_day #poc #voidsec #zerologon
Stars: 89 Issues: 0 Forks: 17
https://github.com/VoidSec/CVE-2020-1472
  
  Exploit Code for CVE-2020-1472 aka Zerologon
Language: Python
#cve_2020 #exploit #n_day #poc #voidsec #zerologon
Stars: 89 Issues: 0 Forks: 17
https://github.com/VoidSec/CVE-2020-1472
GitHub
  
  GitHub - VoidSec/CVE-2020-1472: Exploit Code for CVE-2020-1472 aka Zerologon
  Exploit Code for CVE-2020-1472 aka Zerologon. Contribute to VoidSec/CVE-2020-1472 development by creating an account on GitHub.
  ant4g0nist/Vulnerable-Kext
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Language: C
#driver #exploit_development #exploitation #ios #kernel #macos #memory_corruption #vulnerabilities #xnu
Stars: 124 Issues: 0 Forks: 11
https://github.com/ant4g0nist/Vulnerable-Kext
  
  A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Language: C
#driver #exploit_development #exploitation #ios #kernel #macos #memory_corruption #vulnerabilities #xnu
Stars: 124 Issues: 0 Forks: 11
https://github.com/ant4g0nist/Vulnerable-Kext
GitHub
  
  GitHub - ant4g0nist/Vulnerable-Kext: A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
  A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation - ant4g0nist/Vulnerable-Kext
  0xyg3n/UAC_Exploit
Escalate as Administrator bypassing the UAC affecting administrator accounts only.
Language: C#
#csharp #exploit #silent #uac #uac_authorization #uac_bypass #uacbypass #windows
Stars: 105 Issues: 0 Forks: 25
https://github.com/0xyg3n/UAC_Exploit
  
  Escalate as Administrator bypassing the UAC affecting administrator accounts only.
Language: C#
#csharp #exploit #silent #uac #uac_authorization #uac_bypass #uacbypass #windows
Stars: 105 Issues: 0 Forks: 25
https://github.com/0xyg3n/UAC_Exploit
GitHub
  
  GitHub - 0xyg3n/UAC_Exploit: Escalate as Administrator bypassing the UAC affecting administrator accounts only.
  Escalate as Administrator bypassing the UAC affecting administrator accounts only. - 0xyg3n/UAC_Exploit
  terorie/cve-2021-3449
CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
Language: Go
#cve_2021_3449 #denial_of_service #exploit #openssl #tls
Stars: 156 Issues: 1 Forks: 26
https://github.com/terorie/cve-2021-3449
  
  CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
Language: Go
#cve_2021_3449 #denial_of_service #exploit #openssl #tls
Stars: 156 Issues: 1 Forks: 26
https://github.com/terorie/cve-2021-3449
GitHub
  
  GitHub - riptl/cve-2021-3449: CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
  CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻 - riptl/cve-2021-3449
  sickcodes/no-sandbox
No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: https://no-sandbox.io/
#0day #bug #bugbounty #chrome #chromium #exploit #rce #research
Stars: 91 Issues: 2 Forks: 8
https://github.com/sickcodes/no-sandbox
  
  No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: https://no-sandbox.io/
#0day #bug #bugbounty #chrome #chromium #exploit #rce #research
Stars: 91 Issues: 2 Forks: 8
https://github.com/sickcodes/no-sandbox
no-sandbox
  
  No Sandbox
  No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: https://no-sandbox.io/
  Cr4sh/KernelForge
A library to develop kernel level Windows payloads for post HVCI era
Language: C++
#windows #library #kernel #exploit #hypervisor #vbs #rookit #hvci
Stars: 105 Issues: 0 Forks: 21
https://github.com/Cr4sh/KernelForge
  
  A library to develop kernel level Windows payloads for post HVCI era
Language: C++
#windows #library #kernel #exploit #hypervisor #vbs #rookit #hvci
Stars: 105 Issues: 0 Forks: 21
https://github.com/Cr4sh/KernelForge
GitHub
  
  GitHub - Cr4sh/KernelForge: A library to develop kernel level Windows payloads for post HVCI era
  A library to develop kernel level Windows payloads for post HVCI era - Cr4sh/KernelForge
  stong/CVE-2020-15368
How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys
Language: C++
#windows #kernel #exploit
Stars: 119 Issues: 0 Forks: 11
https://github.com/stong/CVE-2020-15368
  
  How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys
Language: C++
#windows #kernel #exploit
Stars: 119 Issues: 0 Forks: 11
https://github.com/stong/CVE-2020-15368
GitHub
  
  GitHub - stong/CVE-2020-15368: CVE-2020-15368, aka "How to exploit a vulnerable driver"
  CVE-2020-15368, aka "How to exploit a vulnerable driver" - stong/CVE-2020-15368
  HuskyHacks/ShadowSteal
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Language: Nim
#windows #nim #exploit #exploit_development
Stars: 112 Issues: 0 Forks: 25
https://github.com/HuskyHacks/ShadowSteal
  
  Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Language: Nim
#windows #nim #exploit #exploit_development
Stars: 112 Issues: 0 Forks: 25
https://github.com/HuskyHacks/ShadowSteal
GitHub
  
  GitHub - HuskyHacks/ShadowSteal: Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
  Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation - HuskyHacks/ShadowSteal
  nerdsinspace/nocom-explanation
block game military grade radar
#minecraft #exploit #radar #exploitation #2b2t #papermc #nocomment #nocom
Stars: 113 Issues: 3 Forks: 6
https://github.com/nerdsinspace/nocom-explanation
  
  block game military grade radar
#minecraft #exploit #radar #exploitation #2b2t #papermc #nocomment #nocom
Stars: 113 Issues: 3 Forks: 6
https://github.com/nerdsinspace/nocom-explanation
GitHub
  
  GitHub - nerdsinspace/nocom-explanation: block game military grade radar
  block game military grade radar. Contribute to nerdsinspace/nocom-explanation development by creating an account on GitHub.
  assetnote/batchql
GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations
Language: Python
#batch #exploit #graphql
Stars: 113 Issues: 0 Forks: 6
https://github.com/assetnote/batchql
  
  GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations
Language: Python
#batch #exploit #graphql
Stars: 113 Issues: 0 Forks: 6
https://github.com/assetnote/batchql
GitHub
  
  GitHub - assetnote/batchql: GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations
  GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations - assetnote/batchql
  Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches
Language: Java
#bugbounttips #bugbounty #bugbounty_writeups #cve #cve_2021_44228 #cybersecurity #exploit #hacking #log4j #payload #pentest #pentesting #red_team #security #security_writeups #writeups
Stars: 191 Issues: 0 Forks: 38
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
  
  🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches
Language: Java
#bugbounttips #bugbounty #bugbounty_writeups #cve #cve_2021_44228 #cybersecurity #exploit #hacking #log4j #payload #pentest #pentesting #red_team #security #security_writeups #writeups
Stars: 191 Issues: 0 Forks: 38
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
GitHub
  
  GitHub - Puliczek/CVE-2021-44228-PoC-log4j-bypass-words: 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
  🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks - Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
❤2
  DavidBuchanan314/ambiguous-png-packer
Craft PNG files that appear completely different in Apple software
Language: Python
#apple #exploit #idot #png #png_encoder
Stars: 389 Issues: 1 Forks: 8
https://github.com/DavidBuchanan314/ambiguous-png-packer
  
  Craft PNG files that appear completely different in Apple software
Language: Python
#apple #exploit #idot #png #png_encoder
Stars: 389 Issues: 1 Forks: 8
https://github.com/DavidBuchanan314/ambiguous-png-packer
GitHub
  
  GitHub - DavidBuchanan314/ambiguous-png-packer: Craft PNG files that appear completely different in Apple software [NOW PATCHED]
  Craft PNG files that appear completely different in Apple software [NOW PATCHED] - DavidBuchanan314/ambiguous-png-packer
  mufeedvh/moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Language: Rust
#cve #exploit #exploitation #infosec #infosectools #linux #privilege_escalation #red_teaming #redteam #redteam_tools #security #security_tools
Stars: 279 Issues: 0 Forks: 23
https://github.com/mufeedvh/moonwalk
  
  Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Language: Rust
#cve #exploit #exploitation #infosec #infosectools #linux #privilege_escalation #red_teaming #redteam #redteam_tools #security #security_tools
Stars: 279 Issues: 0 Forks: 23
https://github.com/mufeedvh/moonwalk
GitHub
  
  GitHub - mufeedvh/moonwalk: Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
  Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. - mufeedvh/moonwalk
  Puliczek/awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
#blue_team #bugbounttips #bugbounty #cve_2021_44228 #cybersecurity #exploit #log4j #pentesting #poc #red_team #security #security_writeups #writeups
Stars: 139 Issues: 0 Forks: 9
https://github.com/Puliczek/awesome-list-of-secrets-in-environment-variables
  
  🦄🔒 Awesome list of secrets in environment variables 🖥️
#blue_team #bugbounttips #bugbounty #cve_2021_44228 #cybersecurity #exploit #log4j #pentesting #poc #red_team #security #security_writeups #writeups
Stars: 139 Issues: 0 Forks: 9
https://github.com/Puliczek/awesome-list-of-secrets-in-environment-variables
GitHub
  
  GitHub - Puliczek/awesome-list-of-secrets-in-environment-variables: 🦄🔒 Awesome list of secrets in environment variables 🖥️
  🦄🔒 Awesome list of secrets in environment variables 🖥️ - Puliczek/awesome-list-of-secrets-in-environment-variables
👎5👍1
  