0vercl0k / paracosmeLinks
Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stage during the Pwn2Own Miami 2022 competition.
☆89Updated last year
Alternatives and similar repositories for paracosme
Users that are interested in paracosme are comparing it to the libraries listed below
Sorting:
- ☆72Updated last year
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- Cisco ASA Software and ASDM Security Research☆85Updated 3 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 years ago
- ☆153Updated 2 years ago
- Full disclosures for CVE ids, proofs of concept, exploits, 0day bugs and so on.☆112Updated 2 years ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆28Updated 3 years ago
- Foxit PDF Reader Remote Code Execution Exploit☆118Updated last year
- Exploit of RealVNC VNC Server☆28Updated 2 years ago
- some sploits☆18Updated last year
- ☆124Updated 3 years ago
- ☆86Updated 2 years ago
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- ☆24Updated 2 years ago
- Proof-of-Concept for CVE-2024-21345☆76Updated last year
- ☆59Updated last year
- Random CVEs☆33Updated 4 months ago
- xortigate-cve-2023-27997☆64Updated last year
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Updated 3 years ago
- Learnings about windows Internals☆94Updated last year
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆28Updated 4 months ago
- Collection of slides☆33Updated last month
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆64Updated 10 months ago
- ☆27Updated 2 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Updated last year
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- Adobe Reader DC Information Leak Exploit☆22Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year