0xIronGoat / dirty-pipeLinks
Implementation of Max Kellermann's exploit for CVE-2022-0847
☆10Updated 3 years ago
Alternatives and similar repositories for dirty-pipe
Users that are interested in dirty-pipe are comparing it to the libraries listed below
Sorting:
- ☆17Updated 2 years ago
- ☆19Updated last year
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆31Updated last year
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Random Tips and Writeups.☆15Updated 6 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- Collection of scripts that I created to make my life easier.☆11Updated 4 years ago
- My malware analysis code snippets☆28Updated 2 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆21Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆58Updated 3 years ago
- ☆17Updated 3 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆16Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Updated 3 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- ☆25Updated 3 years ago
- ☆12Updated last year
- Help deobfuscate VBScript☆16Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Vulnerable docker images for CVE-2021-41773☆21Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 4 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago