#exploit
CVE-2021-31955:
Windows Kernel Information Disclosure Vulnerability (PoC)
https://github.com/mavillon1/CVE-2021-31955-POC
CVE-2021-31955:
Windows Kernel Information Disclosure Vulnerability (PoC)
https://github.com/mavillon1/CVE-2021-31955-POC
#exploit
CVE-2021-33909:
Sequoia - A LPE Vulnerability in Linux’s Filesystem Layer (CVE-2021-33909)
https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt
// Tested on Ubuntu, Debian, Fedora
CVE-2021-33909:
Sequoia - A LPE Vulnerability in Linux’s Filesystem Layer (CVE-2021-33909)
https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt
// Tested on Ubuntu, Debian, Fedora
cve-2021-33909
#exploit
CVE-2021-33909:
Sequoia - A LPE Vulnerability in Linux’s Filesystem Layer (CVE-2021-33909)
https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt
// Tested on Ubuntu, Debian, Fedora
#exploit
CVE-2021-33909:
Sequoia - A LPE Vulnerability in Linux’s Filesystem Layer (CVE-2021-33909)
https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt
// Tested on Ubuntu, Debian, Fedora
#exploit
PoC for exploiting CVE-2021-28903:
A stack overflow in libyang <= v1.0.225 can cause a denial of service through function lyxml_parse_mem()
https://github.com/AlAIAL90/CVE-2021-28903
PoC for exploiting CVE-2021-28903:
A stack overflow in libyang <= v1.0.225 can cause a denial of service through function lyxml_parse_mem()
https://github.com/AlAIAL90/CVE-2021-28903
RomBuster - router exploitation tool
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
#RomBuster #Router #Exploitation #Exploit #VULNERABILITIES
https://reconshell.com/rombuster-router-exploitation-tool/
#exploit
1. CVE-2021-31184:
Information disclosure in Microsoft Windows
Infrared Data Association (IrDA)
https://github.com/waleedassar/CVE-2021-31184
2. CVE-2021-22545:
A CVE from BinDiff & IDA Pro
https://jhftss.github.io/CVE-2021-22545
1. CVE-2021-31184:
Information disclosure in Microsoft Windows
Infrared Data Association (IrDA)
https://github.com/waleedassar/CVE-2021-31184
2. CVE-2021-22545:
A CVE from BinDiff & IDA Pro
https://jhftss.github.io/CVE-2021-22545
GitHub
GitHub - waleedassar/CVE-2021-31184
Contribute to waleedassar/CVE-2021-31184 development by creating an account on GitHub.
AdbNet - An Exploitation Framework for android devices
#AdbNet #ADB #Exploitation #Framework #Android #Exploit
https://reconshell.com/adbnet-an-exploitation-framework-for-android-devices/
#AdbNet #ADB #Exploitation #Framework #Android #Exploit
https://reconshell.com/adbnet-an-exploitation-framework-for-android-devices/
Penetration Testing Tools, ML and Linux Tutorials
AdbNet - An Exploitation Framework for android devices - Penetration Testing Tools, ML and Linux Tutorials
Create an account on censys.io and then go to your account page and get your free api_id and api_secret key and open 'adbnet.py' and edit in your api id and
#exploit
CVE 2021-36394:
Moodle RCE risk when Shibboleth authentication is enabled (PoC)
https://github.com/dinhbaouit/CVE-2021-36394
]-> https://0xd0ff9.wordpress.com/2021/08/28/cve-2021-36394-hack-truong-sua-diem-cac-kieu
CVE 2021-36394:
Moodle RCE risk when Shibboleth authentication is enabled (PoC)
https://github.com/dinhbaouit/CVE-2021-36394
]-> https://0xd0ff9.wordpress.com/2021/08/28/cve-2021-36394-hack-truong-sua-diem-cac-kieu
GitHub
GitHub - dinhbaouit/CVE-2021-36394
Contribute to dinhbaouit/CVE-2021-36394 development by creating an account on GitHub.
#exploit
PoCs for exploiting CVE-2021-21847,
CVE-2021-21853, CVE-2021-21845,
CVE-2021-21846, CVE-2021-21844
CVE-2021-21839:
https://github.com/AlAIAL90/CVE-2021-21847
https://github.com/AlAIAL90/CVE-2021-21853
https://github.com/AlAIAL90/CVE-2021-21845
https://github.com/AlAIAL90/CVE-2021-21846
https://github.com/AlAIAL90/CVE-2021-21844
https://github.com/AlAIAL90/CVE-2021-21839
// Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project
PoCs for exploiting CVE-2021-21847,
CVE-2021-21853, CVE-2021-21845,
CVE-2021-21846, CVE-2021-21844
CVE-2021-21839:
https://github.com/AlAIAL90/CVE-2021-21847
https://github.com/AlAIAL90/CVE-2021-21853
https://github.com/AlAIAL90/CVE-2021-21845
https://github.com/AlAIAL90/CVE-2021-21846
https://github.com/AlAIAL90/CVE-2021-21844
https://github.com/AlAIAL90/CVE-2021-21839
// Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project
#exploit
CVE-2021-1588:
A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1588
]-> A vulnerability in the implementation of the system login block-for command for Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1590
]-> A vulnerability in the EtherChannel port subscription logic of Cisco Nexus 9500 Series Switches
https://github.com/AlAIAL90/CVE-2021-1591
CVE-2021-1588:
A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1588
]-> A vulnerability in the implementation of the system login block-for command for Cisco NX-OS Software
https://github.com/AlAIAL90/CVE-2021-1590
]-> A vulnerability in the EtherChannel port subscription logic of Cisco Nexus 9500 Series Switches
https://github.com/AlAIAL90/CVE-2021-1591