CVE-2021-41773 playground
翻译 - CVE-2021-41773 操场
CVE-2021-41773 CVE-2021-42013漏洞批量检测工具
Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773
MASS CVE-2021-41773
Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519
CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.
Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE
Exploit for Apache 2.4.49
[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 ...
ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)
C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
翻译 - CVE-2021-1675/PrintNightmare 的 C# 和 Impacket 实现
Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)
CVE-2021-4034 1day
翻译 - CVE-2021-4034 1 天
Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527
翻译 - CVE-2021-1675 的本地提权版
CVE-2021-40444 PoC
翻译 - CVE-2021-40444 PoC
apache路径穿越漏洞poc&exp
Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)
翻译 - 在磁盘和 Java 存档文件中查找易受攻击的 Log4j2 版本(Log4Shell CVE-2021-44228 和 CVE-2021-45046)
CVE-2021-1732 Exploit
翻译 - CVE-2021-1732利用
NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
翻译 - 利用 CVE-2021-42278 和 CVE-2021-42287 冒充标准域用户的 DA
CVE-2021-40444
翻译 - CVE-2021-40444
CVE 2021-21315 PoC
翻译 - CVE 2021-21315很少
CVE-2021-40444 Sample
翻译 - CVE-2021-40444 示例