#
🎯
Focusing
Lists (9)
Sort Name ascending (A-Z)
Starred repositories
13
stars
written in C
Clear filter
A little tool to play with Windows security
Situational Awareness commands implemented using Beacon Object Files
bypass disable_functions via LD_PRELOA (no need /usr/sbin/sendmail)
A root exploit for CVE-2022-0847 (Dirty Pipe)
A beacon object file implementation of PoolParty Process Injection Technique.
使用JNI加密字节码,通过JVMTI解密字节码以保护代码,支持自定义包名和密钥,使用魔法禁止黑客dump字节码
9ak47er / 0day
Forked from msr00t/0day各种CMS、各种平台、各种系统、各种软件漏洞的EXP、POC 该项目将不断更新