Vulnerabilities, exploits, and PoCs
☆37Mar 17, 2026Updated last week
Alternatives and similar repositories for AARO-Bugs
Users that are interested in AARO-Bugs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Aug 25, 2016Updated 9 years ago
- ☆11Oct 18, 2019Updated 6 years ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated 2 months ago
- ☆12Aug 31, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆21Jun 3, 2021Updated 4 years ago
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- Reference material for fuzzing and creating fuzzers☆19Apr 6, 2019Updated 6 years ago
- Source files for my posts☆17Jun 20, 2023Updated 2 years ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- Workshop Materials from DEFCON 25 (7/27/2017)☆22Jul 31, 2017Updated 8 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆131Mar 22, 2024Updated 2 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- ☆27Jan 8, 2022Updated 4 years ago
- Man-in-the-middle made easy!☆15Mar 25, 2020Updated 6 years ago
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Dec 22, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Sep 8, 2020Updated 5 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- ntoskrnl symbol pdb and undocument structures☆25Oct 25, 2017Updated 8 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Simple DLL and client app that work together to hook all the functions in WinHvPlatform.dll in order to provide logging and introspection…☆21Dec 1, 2021Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆57Nov 16, 2021Updated 4 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Jun 19, 2023Updated 2 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆11Feb 12, 2023Updated 3 years ago
- Quick test for CVE-2023-26025 behaviours☆13Nov 29, 2023Updated 2 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆151Mar 2, 2023Updated 3 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Aug 20, 2020Updated 5 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago