POC of CVE-2018-9995 written in Rust.
☆95Nov 1, 2025Updated 4 months ago
Alternatives and similar repositories for CVE-2018-9995-rs
Users that are interested in CVE-2018-9995-rs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Mar 10, 2019Updated 7 years ago
- ☆101Jan 27, 2026Updated 2 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- Nice Learning is a completely free custom theme for Moodle 5.x. It’s clean, user-friendly, and fully compatible with right-to-left (RTL) …☆19Dec 6, 2025Updated 3 months ago
- WhatsApp Web phishing page for authorized pentesting. Captures international phone numbers + OTP codes with pixel-perfect 2026 UI. Real-t…☆39Mar 6, 2026Updated 3 weeks ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- ⚡ Magisk Module to boost charging speed with smart tweaks.☆22Mar 20, 2026Updated last week
- Next.js React Server Components RCE exploit for CVE-2025-55182☆51Dec 5, 2025Updated 3 months ago
- Shellcode Loader Library.☆14Sep 21, 2025Updated 6 months ago
- CTFs I've played so far☆18Feb 1, 2025Updated last year
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last month
- A fast, deterministic, non-cryptographic hash for use in hash tables for Rust☆15Jan 12, 2021Updated 5 years ago
- 7z exploit POC versions prior to 25.01☆33Aug 11, 2025Updated 7 months ago
- Advanced analysis software for APK payloads created by RATs.☆37Mar 9, 2026Updated 3 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆43Jan 18, 2026Updated 2 months ago
- this is a bot that will get the correct answers right at least 90% of the time on edgenuity. edgenuity is a common site used for middle s…☆14Jun 28, 2021Updated 4 years ago
- Convert image Blob and File to different formats (png, webp and jpeg)☆11Mar 9, 2017Updated 9 years ago
- adb未授权管理☆40Feb 24, 2026Updated last month
- This is a powershell module to help implement the AD Tier Model☆15Feb 17, 2026Updated last month
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 9 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago
- Python scripts and tools built during my learning journey☆31Nov 14, 2025Updated 4 months ago
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This will serve as links to write-ups about solving the challenges on ROOTCON's CTF through the years☆30Oct 5, 2024Updated last year
- Spoof bootloader property (Android OS layer only) and Play Integrity verdict☆40Dec 11, 2025Updated 3 months ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Reset bootloader properties. / 重置 Bootloader 属性值。☆26Dec 30, 2025Updated 3 months ago
- しょっぱ!☆13Jul 23, 2021Updated 4 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- ☆13Jan 5, 2015Updated 11 years ago
- ☆17Mar 8, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A tool in Python used with the Yardstick One to perform replay and rolling code attacks, specifically on cars.☆19Feb 26, 2021Updated 5 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- ☆13Oct 27, 2020Updated 5 years ago
- Reading/writing memory from kernel-mode☆29Aug 3, 2017Updated 8 years ago
- Sun NFS 2.0 Release☆24Sep 16, 2025Updated 6 months ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 4 months ago
- Extract the Procedures (TTP) from CTI reports☆17Dec 13, 2025Updated 3 months ago