#Thread_Stack_Spoofing PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts
https://github.com/mgeeky/ThreadStackSpoofer
#RustSCRunner Shellcode Runner/Injector in Rust using NTDLL functions directly with the ntapi Library
https://github.com/memN0ps/RustSCRunner
https://github.com/mgeeky/ThreadStackSpoofer
#RustSCRunner Shellcode Runner/Injector in Rust using NTDLL functions directly with the ntapi Library
https://github.com/memN0ps/RustSCRunner
#CVE-2021-22005 - #VMWare vCenter Server File Upload to #RCE
https://github.com/r0ckysec/CVE-2021-22005
https://github.com/r0ckysec/CVE-2021-22005
#MHDDoS Best DDoS Attack Script Python3, Cyber Attack With 36 Method
https://github.com/MHProDev/MHDDoS
https://github.com/MHProDev/MHDDoS
#CVE-2021-22205 Unauthorized RCE
https://github.com/r0eXpeR/CVE-2021-22205
#CVE-2021-22205& GitLab CE/EE RCE
https://github.com/Al1ex/CVE-2021-22205
https://github.com/r0eXpeR/CVE-2021-22205
#CVE-2021-22205& GitLab CE/EE RCE
https://github.com/Al1ex/CVE-2021-22205
Integrate #Magisk_root and #OpenGApps into #WSA
_ Windows Subsystem for Android
https://github.com/LSPosed/MagiskOnWSA
_ Windows Subsystem for Android
https://github.com/LSPosed/MagiskOnWSA
#ScanT3r Module based #Bug_Bounty Automation Tool
_ python modules
#lorsrf #ssrf #cve #xss #xss_param #sqli #rce #ssti #exec #firebase #paths #injheadersl #reflect #secrets_find
https://github.com/knassar702/scant3r
_ python modules
#lorsrf #ssrf #cve #xss #xss_param #sqli #rce #ssti #exec #firebase #paths #injheadersl #reflect #secrets_find
https://github.com/knassar702/scant3r
#poc #CVE-2021-34484
Windows user profile service elevation of privilege vulnerability
_ The problem affects all versions of the operating system, including Windows 10, Windows 11 and Windows Server 2022
https://github.com/klinix5/ProfSvcLPE
Windows user profile service elevation of privilege vulnerability
_ The problem affects all versions of the operating system, including Windows 10, Windows 11 and Windows Server 2022
https://github.com/klinix5/ProfSvcLPE
Perl syscall/sc injection for MacOS
https://gist.github.com/monoxgas/c0b0f086fc7aa057a8256b42c66761c8
https://gist.github.com/monoxgas/c0b0f086fc7aa057a8256b42c66761c8
How to exploit a double free vulnerability in 2021 'Use After Free for Dummies'
https://github.com/stong/how-to-exploit-a-double-free
https://github.com/stong/how-to-exploit-a-double-free
The project is compiled based on the LandGrey/SpringBootVulExploit list The purpose is to quickly exploit vulnerabilities during hvv and lower the threshold for exploiting vulnerabilities
https://github.com/0x727/SpringBootExploit
https://github.com/0x727/SpringBootExploit
A framework for bug hunting or pentesting targeting websites that have #CVE-2021-41773 Vulnerability in public
https://github.com/HightechSec/scarce-apache2
#poc for the #CVE-2021-20837 RCE in MovableType
https://github.com/ghost-nemesis/cve-2021-20837-poc
https://github.com/HightechSec/scarce-apache2
#poc for the #CVE-2021-20837 RCE in MovableType
https://github.com/ghost-nemesis/cve-2021-20837-poc
converse with Kajit.pdf
5.5 MB
حوار مع Kajit عضو سابق في REvil و DarkSide ومسؤول عن منتدى Ransomware Marketplace _ RAMP