CVE-2021-3156: Sudo heap overflow exploit for Debian 10
☆51Dec 3, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-3156
Users that are interested in CVE-2021-3156 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Apr 27, 2020Updated 6 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- lpe poc for cve-2022-21882☆49Feb 7, 2022Updated 4 years ago
- 🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)☆35Mar 8, 2020Updated 6 years ago
- Frida module utils, writen in typescript☆16Jan 30, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Scripts to automatically create VM images☆15Apr 12, 2026Updated 2 weeks ago
- Some of my CTF solutions☆80May 13, 2019Updated 6 years ago
- a cute shell thingy that written in rust☆11May 16, 2022Updated 3 years ago
- ☆24May 26, 2021Updated 4 years ago
- ☆14Jul 18, 2022Updated 3 years ago
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- ROP Wargame repository☆28Sep 11, 2017Updated 8 years ago
- ☆23Jul 18, 2023Updated 2 years ago
- Virtual Inheritance Reverse Engineering☆19Aug 20, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- old linux source code.it's easy to lean.☆31Apr 18, 2018Updated 8 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Fuzzing with the generated argument☆33Jan 6, 2023Updated 3 years ago
- PoC☆12Apr 7, 2025Updated last year
- Containing vulnerabilities I've discovered and maybe CVE☆19Apr 14, 2023Updated 3 years ago
- Skul is a PoC to bruteforce the Cryptsetup implementation of Linux Unified Key Setup (LUKS).☆14Jul 12, 2018Updated 7 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆11Sep 2, 2020Updated 5 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well.☆43Aug 28, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆157Feb 13, 2022Updated 4 years ago
- ☆158Jul 10, 2024Updated last year
- CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入☆70Apr 26, 2022Updated 4 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 4 years ago
- VSCode dark theme for IDA 7.3☆29Dec 8, 2020Updated 5 years ago
- Script for emulating Arm firmware in QEMU, including a binary for hooking functions for certain Tenda firmware versions that are not stra…☆31Mar 23, 2020Updated 6 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Some Ghidra scripts to automate my reverse-engineering tasks☆20Mar 18, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆12Jan 10, 2026Updated 3 months ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆91Feb 16, 2022Updated 4 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- KVM-based memory access recorder☆20Oct 14, 2018Updated 7 years ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆43Sep 15, 2024Updated last year
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago