Add: lockedbyte/CVE-2021-40444 to Execution section

This commit is contained in:
pe3zx 2021-09-11 15:52:47 +07:00
parent 81d2b69b88
commit d4f3c50467

View File

@ -747,6 +747,10 @@ Some tools can be categorized in more than one category. But because the current
<td><a href="https://github.com/l373/GIVINGSTORM">l373/GIVINGSTORM</a></td> <td><a href="https://github.com/l373/GIVINGSTORM">l373/GIVINGSTORM</a></td>
<td>Infection vector that bypasses AV, IDS, and IPS. (For now...)</td> <td>Infection vector that bypasses AV, IDS, and IPS. (For now...)</td>
</tr> </tr>
<tr>
<td><a href="https://github.com/lockedbyte/CVE-2021-40444">lockedbyte/CVE-2021-40444</a></td>
<td>Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution)</td>
</tr>
<tr> <tr>
<td><a href="https://github.com/mdsecactivebreach/SharpShooter">mdsecactivebreach/SharpShooter</a></td> <td><a href="https://github.com/mdsecactivebreach/SharpShooter">mdsecactivebreach/SharpShooter</a></td>
<td>SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source <td>SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source