Longue vue is an exploit chain that can compromise over the internet NETGEAR DGND3700v2 devices.
☆26Mar 15, 2022Updated 4 years ago
Alternatives and similar repositories for longue-vue
Users that are interested in longue-vue are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆57Feb 26, 2022Updated 4 years ago
- ☆19May 1, 2025Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆131Apr 25, 2022Updated 4 years ago
- IDA plugin to make classes automatically☆21Oct 31, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Python bindings for BochsCPU☆39Aug 10, 2025Updated 9 months ago
- Chain-of-thought 방식을 활용하여 llama2를 fine-tuning☆10Nov 18, 2023Updated 2 years ago
- Official write-up for Speed Hack event at POC2017☆13Nov 11, 2017Updated 8 years ago
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- 🗃 Check the status of multiple git repositories in a folder☆12Feb 19, 2023Updated 3 years ago
- Shielder's public proof of concepts collection☆34Apr 23, 2026Updated 3 weeks ago
- All PWN-oriented (X-DEV/RE) CTFs from http://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs☆11Nov 21, 2022Updated 3 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆27May 21, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Web application to visualize GreyNoise API data☆21Dec 4, 2018Updated 7 years ago
- Examples in "Rust Essentials" Book☆10Jun 17, 2016Updated 9 years ago
- GhidraMod By @NyaMisty: See https://github.com/NyaMisty/GhidraIDA for more☆19Feb 11, 2026Updated 3 months ago
- Automated testing of SMTP servers for penetration testing☆14Oct 23, 2025Updated 6 months ago
- MappingInjection via csharp☆39Nov 19, 2021Updated 4 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- ☆13Mar 28, 2022Updated 4 years ago
- Fast program tracing and analysis☆17Apr 13, 2026Updated last month
- PoC for old Binder vulnerability (based on P0 exploit)☆14Oct 27, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- HookDetection☆45Sep 3, 2021Updated 4 years ago
- A collection of Browser DOM Vulnerabilities with PoCs☆39Nov 20, 2018Updated 7 years ago
- A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure☆19Jun 13, 2023Updated 2 years ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- A collection of various exploits☆30Sep 17, 2024Updated last year
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 5 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Sigma rules converted for direct use with Zircolite☆14May 13, 2026Updated last week
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Oct 8, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 3 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- ☆30Aug 26, 2021Updated 4 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 9 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 5 months ago
- Tired of paying a subscription service to access an API to resolve MAC address OUI/vendor data? Just resolving locally and maintaining yo…☆13Jan 15, 2025Updated last year
- Slightly better IDA code folding☆14May 26, 2020Updated 5 years ago