#trojan-go The Trojan proxy implemented by Go supports multiplexing/routing functions/CDN relay/Shadowsocks obfuscation plug-in, multi-platform, no dependencies
https://github.com/p4gefau1t/trojan-go
https://github.com/p4gefau1t/trojan-go
#openvpn-install road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
https://github.com/Nyr/openvpn-install
#wireguard-install road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
https://github.com/Nyr/wireguard-install
https://github.com/Nyr/openvpn-install
#wireguard-install road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
https://github.com/Nyr/wireguard-install
exploit for #CVE-2021-40449, a Windows LPE via a UAF in win32kfull!GreResetDCInternal
https://github.com/hakivvi/CVE-2021-40449
https://github.com/hakivvi/CVE-2021-40449
#Fugu14 Untethered iOS 14 Jailbreak
Supported Devices/iOS Versions all arm64e devices (iPhone XS and newer) on iOS 14.3 - 14.5.1
https://github.com/LinusHenze/Fugu14
Supported Devices/iOS Versions all arm64e devices (iPhone XS and newer) on iOS 14.3 - 14.5.1
https://github.com/LinusHenze/Fugu14
#Thread_Stack_Spoofing PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts
https://github.com/mgeeky/ThreadStackSpoofer
#RustSCRunner Shellcode Runner/Injector in Rust using NTDLL functions directly with the ntapi Library
https://github.com/memN0ps/RustSCRunner
https://github.com/mgeeky/ThreadStackSpoofer
#RustSCRunner Shellcode Runner/Injector in Rust using NTDLL functions directly with the ntapi Library
https://github.com/memN0ps/RustSCRunner
#CVE-2021-22005 - #VMWare vCenter Server File Upload to #RCE
https://github.com/r0ckysec/CVE-2021-22005
https://github.com/r0ckysec/CVE-2021-22005
#MHDDoS Best DDoS Attack Script Python3, Cyber Attack With 36 Method
https://github.com/MHProDev/MHDDoS
https://github.com/MHProDev/MHDDoS
#CVE-2021-22205 Unauthorized RCE
https://github.com/r0eXpeR/CVE-2021-22205
#CVE-2021-22205& GitLab CE/EE RCE
https://github.com/Al1ex/CVE-2021-22205
https://github.com/r0eXpeR/CVE-2021-22205
#CVE-2021-22205& GitLab CE/EE RCE
https://github.com/Al1ex/CVE-2021-22205
Integrate #Magisk_root and #OpenGApps into #WSA
_ Windows Subsystem for Android
https://github.com/LSPosed/MagiskOnWSA
_ Windows Subsystem for Android
https://github.com/LSPosed/MagiskOnWSA
#ScanT3r Module based #Bug_Bounty Automation Tool
_ python modules
#lorsrf #ssrf #cve #xss #xss_param #sqli #rce #ssti #exec #firebase #paths #injheadersl #reflect #secrets_find
https://github.com/knassar702/scant3r
_ python modules
#lorsrf #ssrf #cve #xss #xss_param #sqli #rce #ssti #exec #firebase #paths #injheadersl #reflect #secrets_find
https://github.com/knassar702/scant3r
#poc #CVE-2021-34484
Windows user profile service elevation of privilege vulnerability
_ The problem affects all versions of the operating system, including Windows 10, Windows 11 and Windows Server 2022
https://github.com/klinix5/ProfSvcLPE
Windows user profile service elevation of privilege vulnerability
_ The problem affects all versions of the operating system, including Windows 10, Windows 11 and Windows Server 2022
https://github.com/klinix5/ProfSvcLPE