0vercl0k / paracosmeView external linksLinks
Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stage during the Pwn2Own Miami 2022 competition.
☆89Oct 8, 2023Updated 2 years ago
Alternatives and similar repositories for paracosme
Users that are interested in paracosme are comparing it to the libraries listed below
Sorting:
- A Poc on blocking Procmon from monitoring network events☆111Aug 7, 2025Updated 6 months ago
- ☆27Jan 9, 2023Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆132Apr 25, 2022Updated 3 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Keep it secret, keep it safe☆80Feb 6, 2025Updated last year
- ☆53Oct 10, 2023Updated 2 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆86Aug 2, 2021Updated 4 years ago
- ☆11Oct 30, 2024Updated last year
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Oct 3, 2023Updated 2 years ago
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆32Dec 18, 2020Updated 5 years ago
- GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the /etc/passwd file from a system running GitLab…☆140Jun 2, 2023Updated 2 years ago
- A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.☆116Jan 31, 2025Updated last year
- A pure PowerShell/ .NET DFIR capability that dumps the Windows SRUM (System Resource Usage Monitor) database to CSVs for analysis.☆14Oct 21, 2021Updated 4 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Oct 18, 2022Updated 3 years ago
- ☆82Feb 1, 2026Updated last week
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Feb 26, 2022Updated 3 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- Demos for the Blackhat USA 2022 talk "Taking Kerberos to the Next Level"☆258Aug 14, 2022Updated 3 years ago
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆202Sep 13, 2023Updated 2 years ago
- Just some Rust process injector POCs, nothing weird.☆81Mar 6, 2022Updated 3 years ago
- POC for CLFS CVE-2022-24481☆14May 14, 2023Updated 2 years ago
- A pre-authenticated RCE exploit for Inductive Automation Ignition☆48Jul 18, 2022Updated 3 years ago
- ☆35Apr 14, 2025Updated 10 months ago
- it is very good☆516Dec 20, 2022Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆93Mar 8, 2023Updated 2 years ago
- Running .NET from VBA☆149Feb 11, 2023Updated 3 years ago
- ☆184Dec 16, 2022Updated 3 years ago
- ☆33Jul 4, 2023Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Jul 17, 2024Updated last year
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- ☆16May 15, 2025Updated 9 months ago
- Hyper-V VMBusPipe Reversing☆22May 10, 2021Updated 4 years ago
- ☆185Jan 12, 2023Updated 3 years ago
- ☆44Jul 11, 2023Updated 2 years ago
- Python bindings for BochsCPU☆38Aug 10, 2025Updated 6 months ago