0vercl0k/CVE-2021-28476
PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.
Language: C
#hyper_v #rndis #cve_2021_28476 #vmswitch #nvsp #guest_to_host #network_service_provider
Stars: 114 Issues: 0 Forks: 21
https://github.com/0vercl0k/CVE-2021-28476
  
  PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.
Language: C
#hyper_v #rndis #cve_2021_28476 #vmswitch #nvsp #guest_to_host #network_service_provider
Stars: 114 Issues: 0 Forks: 21
https://github.com/0vercl0k/CVE-2021-28476
GitHub
  
  GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.
  PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys. - 0vercl0k/CVE-2021-28476
  hlldz/CVE-2021-1675-LPE
Local Privilege Escalation Edition for CVE-2021-1675
Language: C
#windows #lpe #cobaltstrike #reflectivedll #cve_2021_1675
Stars: 113 Issues: 0 Forks: 26
https://github.com/hlldz/CVE-2021-1675-LPE
  
  Local Privilege Escalation Edition for CVE-2021-1675
Language: C
#windows #lpe #cobaltstrike #reflectivedll #cve_2021_1675
Stars: 113 Issues: 0 Forks: 26
https://github.com/hlldz/CVE-2021-1675-LPE
GitHub
  
  GitHub - hlldz/CVE-2021-1675-LPE: Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527
  Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527 - hlldz/CVE-2021-1675-LPE
  klezVirus/CVE-2021-40444
CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
Language: HTML
#0day #cve_2021_40444 #msword #office #rce #remote_code_execution
Stars: 116 Issues: 0 Forks: 28
https://github.com/klezVirus/CVE-2021-40444
  
  CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
Language: HTML
#0day #cve_2021_40444 #msword #office #rce #remote_code_execution
Stars: 116 Issues: 0 Forks: 28
https://github.com/klezVirus/CVE-2021-40444
GitHub
  
  GitHub - klezVirus/CVE-2021-40444: CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
  CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit - klezVirus/CVE-2021-40444
  Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches
Language: Java
#bugbounttips #bugbounty #bugbounty_writeups #cve #cve_2021_44228 #cybersecurity #exploit #hacking #log4j #payload #pentest #pentesting #red_team #security #security_writeups #writeups
Stars: 191 Issues: 0 Forks: 38
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
  
  🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches
Language: Java
#bugbounttips #bugbounty #bugbounty_writeups #cve #cve_2021_44228 #cybersecurity #exploit #hacking #log4j #payload #pentest #pentesting #red_team #security #security_writeups #writeups
Stars: 191 Issues: 0 Forks: 38
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
GitHub
  
  GitHub - Puliczek/CVE-2021-44228-PoC-log4j-bypass-words: 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
  🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks - Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
❤2
  logpresso/CVE-2021-44228-Scanner
Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228
Language: Java
#cve_2021_44228 #log4j2 #patch #scanner
Stars: 228 Issues: 19 Forks: 59
https://github.com/logpresso/CVE-2021-44228-Scanner
  
  Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228
Language: Java
#cve_2021_44228 #log4j2 #patch #scanner
Stars: 228 Issues: 19 Forks: 59
https://github.com/logpresso/CVE-2021-44228-Scanner
GitHub
  
  GitHub - logpresso/CVE-2021-44228-Scanner: Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228
  Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228 - logpresso/CVE-2021-44228-Scanner
  mergebase/log4j-detector
Detects vulnerable log4j versions on your file-system within any application. It is able to even find instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Language: Java
#cve_2021_44228 #cve_2021_45046 #cybersecurity #log4j #pentest #sca
Stars: 320 Issues: 9 Forks: 45
https://github.com/mergebase/log4j-detector
  
  Detects vulnerable log4j versions on your file-system within any application. It is able to even find instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Language: Java
#cve_2021_44228 #cve_2021_45046 #cybersecurity #log4j #pentest #sca
Stars: 320 Issues: 9 Forks: 45
https://github.com/mergebase/log4j-detector
GitHub
  
  GitHub - mergebase/log4j-detector: A public open sourced tool.  Log4J scanner that detects vulnerable Log4J versions (CVE-2021…
  A public open sourced tool.  Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J ins...
👍1
  kozmer/log4j-shell-poc
A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.
Language: Java
#cve_2021_44228 #java #log4j #security
Stars: 307 Issues: 3 Forks: 63
https://github.com/kozmer/log4j-shell-poc
  
  A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.
Language: Java
#cve_2021_44228 #java #log4j #security
Stars: 307 Issues: 3 Forks: 63
https://github.com/kozmer/log4j-shell-poc
GitHub
  
  GitHub - kozmer/log4j-shell-poc: A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
  A Proof-Of-Concept for the CVE-2021-44228 vulnerability.  - GitHub - kozmer/log4j-shell-poc: A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
  hillu/local-log4j-vuln-scanner
Simple local scanner for vulnerable log4j instances
Language: Go
#cve_2019_17571 #cve_2021_44228 #log4j2 #log4shell #scanner #security #security_tools
Stars: 248 Issues: 7 Forks: 49
https://github.com/hillu/local-log4j-vuln-scanner
  
  Simple local scanner for vulnerable log4j instances
Language: Go
#cve_2019_17571 #cve_2021_44228 #log4j2 #log4shell #scanner #security #security_tools
Stars: 248 Issues: 7 Forks: 49
https://github.com/hillu/local-log4j-vuln-scanner
GitHub
  
  GitHub - hillu/local-log4j-vuln-scanner: Simple local scanner for vulnerable log4j instances
  Simple local scanner for vulnerable log4j instances - hillu/local-log4j-vuln-scanner
  fox-it/log4j-finder
Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228 & CVE-2021-45046)
Language: Python
#cve_2021_44228 #cve_2021_45046 #log4j #log4j_finder #log4j2 #log4shell
Stars: 224 Issues: 4 Forks: 40
https://github.com/fox-it/log4j-finder
  
  Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228 & CVE-2021-45046)
Language: Python
#cve_2021_44228 #cve_2021_45046 #log4j #log4j_finder #log4j2 #log4shell
Stars: 224 Issues: 4 Forks: 40
https://github.com/fox-it/log4j-finder
GitHub
  
  GitHub - fox-it/log4j-finder: Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228…
  Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105) - fox-it/log4j-finder
  mufeedvh/moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Language: Rust
#cve #exploit #exploitation #infosec #infosectools #linux #privilege_escalation #red_teaming #redteam #redteam_tools #security #security_tools
Stars: 279 Issues: 0 Forks: 23
https://github.com/mufeedvh/moonwalk
  
  Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Language: Rust
#cve #exploit #exploitation #infosec #infosectools #linux #privilege_escalation #red_teaming #redteam #redteam_tools #security #security_tools
Stars: 279 Issues: 0 Forks: 23
https://github.com/mufeedvh/moonwalk
GitHub
  
  GitHub - mufeedvh/moonwalk: Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
  Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. - mufeedvh/moonwalk
  