|
CVE-2021-1675@ed724e576a
|
bump
|
2021-10-31 02:43:24 +02:00 |
|
CrackMapExec@a8df4c2a86
|
added rsync enum alternative path
|
2022-01-09 22:52:39 +01:00 |
|
PrintNightmare@5ca891c64d
|
bump
|
2022-01-31 18:30:47 +01:00 |
|
dll_hijacking
|
bump
|
2021-10-23 02:03:06 +02:00 |
|
docs
|
new stuff
|
2022-04-14 01:06:16 +02:00 |
|
impacket@e007046def
|
bump
|
2022-01-31 18:30:47 +01:00 |
|
macros
|
new stuff
|
2022-04-14 01:06:16 +02:00 |
|
payloads
|
payload
|
2021-12-17 01:06:21 +01:00 |
|
printspoofer@29a9e27f54
|
bump
|
2022-02-26 01:01:44 +01:00 |
|
process_injection
|
new stuff
|
2022-04-14 01:06:16 +02:00 |
|
service_escalation
|
bump
|
2021-10-31 02:43:24 +02:00 |
|
windows-kernel-exploits@2b944b52ee
|
second commit
|
2021-08-23 01:13:54 +02:00 |
|
zero_logon
|
second commit
|
2021-08-23 01:13:54 +02:00 |