#free #shadowsocks #v2ray #trojan
Over the wall, free over the wall, free scientific Internet access
source code
https://github.com/freefq/free
After downloading the version for your device
1 copy v2ray list
2 import config from Clipboard
Then choose from the program list
Over the wall, free over the wall, free scientific Internet access
source code
https://github.com/freefq/free
After downloading the version for your device
1 copy v2ray list
2 import config from Clipboard
Then choose from the program list
#Python implementation for #PrintNightmare #CVE-2021-1675 / #CVE-2021-34527
https://github.com/ly4k/PrintNightmare
https://github.com/ly4k/PrintNightmare
#L0phtCrack v7.2.0 Release Notes
Open source release
Replaced commercial libraries with OpenSSL and LibSSH2
Improved SSH importing to support IPV6
https://gitlab.com/l0phtcrack/l0phtcrack/-/releases
Open source release
Replaced commercial libraries with OpenSSL and LibSSH2
Improved SSH importing to support IPV6
https://gitlab.com/l0phtcrack/l0phtcrack/-/releases
Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!
https://github.com/p0dalirius/LDAPmonitor
https://github.com/p0dalirius/LDAPmonitor
#poc for a denial of service bug in the Windows kernel
Tested on Windows 10 (19041.1.amd64fre.vb_release.191206-1406) ✅
https://github.com/waleedassar/KeCreateEnclave_NullPtr_Dereference_DOS
Tested on Windows 10 (19041.1.amd64fre.vb_release.191206-1406) ✅
https://github.com/waleedassar/KeCreateEnclave_NullPtr_Dereference_DOS
#ProxyLogon Full #Exploit Chain #poc (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)
https://github.com/herwonowr/exprolog
https://github.com/herwonowr/exprolog
A small #poc for the recent RCE found in the Goahead Webserver prior to version 5.1.5
https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-
https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-
#shellcode_injection_techniques
All techniques use an AES encrypted meterpreter payload
Some techniques are better than others at bypassing AV
https://github.com/plackyhacker/Shellcode-Injection-Techniques
All techniques use an AES encrypted meterpreter payload
Some techniques are better than others at bypassing AV
https://github.com/plackyhacker/Shellcode-Injection-Techniques
Chrome in-the-wild bug analysis CVE-2021-37975
https://securitylab.github.com/research/in_the_wild_chrome_cve_2021_37975
https://securitylab.github.com/research/in_the_wild_chrome_cve_2021_37975