Skip to content
View p4yl0ad's full-sized avatar
👲
👲

Block or report p4yl0ad

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
p4yl0ad/README.md

CVEs

CVE ID Target Type Vendor Title
CVE-2022-48127 Web Application Asus RT-ACG1200G+ Router Webserver Open Redirect
CVE-2024-23480
CVE-2024-23482
CVE-2024-23483
CVE-2024-31127
macOS Application Zscaler Zscaler Client Connector NSXPC Local Privilege Escalation
CVE-2024-27357 macOS Application WithSecure Elements Installer Local Privilege Escalation
CVE-2024-27358 macOS Application WithSecure Elements Installer Denial of Service
CVE-2024-30165 macOS Application Amazon AWS AWS VPN XPC Local Privilege Escalation
CVE-2024-47193 macOS Application WithSecure Elements installer Denial of Service
wontfix Windows Application Zscaler Zscaler Client Connector Windows Denial of Service
fixed macOS Application Zscaler Zscaler Client Connector macOS Hardened Runtime Bypass
Bugcrowd macOS Application Dropbox TCC Bypass
Bugcrowd macOS Application Dropbox TCC Bypass
Bugcrowd macOS Application Dropbox TCC Bypass
Bugcrowd macOS Application Dropbox TCC Bypass
Bugcrowd macOS Application Dropbox TCC Bypass
Bugcrowd macOS Application Upwork TCC Bypass
Bugcrowd macOS Application netSkope installer Local Privilege Escalation
wontfix (hackerone) macOS Application Logitech Local Privilege Escalation
wontfix (hackerone) macOS Application Logitech Local Privilege Escalation
Bugcrowd macOS Application Front TCC Bypass
Dupe macOS Application Zscaler Zscaler Client Connector Installer Local Privilege Escalation
Dupe macOS Application Zscaler Zscaler Client Connector Installer Local Privilege Escalation
TBD TBD IBM IBM Product
TBD TBD VMware VMware Product
TBD TBD Palo Alto Palo Alto Product

Pinned Loading

  1. rust_ppid_break_chain rust_ppid_break_chain Public

    using Werfault.exe to break parent process chains

    Rust 8 1

  2. regloop regloop Public

    grabbing registered protocol handlers from the windows registry

    Rust 2

  3. eles eles Public

    implementation of dir written in c/c++

    C++

  4. getppid getppid Public

    Rust implementation of getppid

    Rust

  5. Snippet which uses LdrLoadDll to for... Snippet which uses LdrLoadDll to force load a DLL and use handle returned to get a pointer to a function.
    1
    #include <windows.h>
    2
    #pragma comment(lib, "ntdll.lib") 
    3
    //#pragma comment(lib, "ntdllp.lib") 
    4
    #define NT_SUCCESS(Status) (((NTSTATUS)(Status)) >= 0)
    5
    
                  
  6. apisetparse apisetparse Public

    Uses the PEB to obtain an apisetmap in order to translate umbrella DLL's such as "api-ms-win-http-time-l1-1-0.dll" to their origin forward DLL e.g. kernelbase.dll

    C 2