Vulnerabilities, exploits, and PoCs
☆39Apr 28, 2026Updated 3 weeks ago
Alternatives and similar repositories for AARO-Bugs
Users that are interested in AARO-Bugs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Aug 25, 2016Updated 9 years ago
- ☆11Oct 18, 2019Updated 6 years ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated 4 months ago
- ☆12Aug 31, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆21Jun 3, 2021Updated 4 years ago
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- Reference material for fuzzing and creating fuzzers☆19Apr 6, 2019Updated 7 years ago
- Source files for my posts☆17Jun 20, 2023Updated 2 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- Workshop Materials from DEFCON 25 (7/27/2017)☆22Jul 31, 2017Updated 8 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated last year
- Library of traffic redirectors☆26Apr 7, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆56Jun 26, 2021Updated 4 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- CVE-2021-21972☆33Mar 1, 2021Updated 5 years ago
- ☆27Jan 8, 2022Updated 4 years ago
- Man-in-the-middle made easy!☆15Mar 25, 2020Updated 6 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Sep 8, 2020Updated 5 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- ntoskrnl symbol pdb and undocument structures☆24Oct 25, 2017Updated 8 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple DLL and client app that work together to hook all the functions in WinHvPlatform.dll in order to provide logging and introspection…☆22Dec 1, 2021Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆59Nov 16, 2021Updated 4 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- Identify and exploit leaked handles for local privilege escalation.☆112Jun 19, 2023Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆19Jun 29, 2024Updated last year
- ☆11Feb 12, 2023Updated 3 years ago
- Quick test for CVE-2023-26025 behaviours☆13Nov 29, 2023Updated 2 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆150Mar 2, 2023Updated 3 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Aug 20, 2020Updated 5 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Public version of dopescope code☆14Jan 31, 2017Updated 9 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 9 years ago
- ☆19Sep 15, 2021Updated 4 years ago
- A very simple coverage highlighter for VIM☆12Dec 2, 2020Updated 5 years ago