POC for netdata ndsudo vulnerability - CVE-2024-32019
☆21Aug 3, 2025Updated 7 months ago
Alternatives and similar repositories for CVE-2024-32019-POC
Users that are interested in CVE-2024-32019-POC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of Concept for CVE-2025-31161 / CVE-2025-2825☆49Apr 8, 2025Updated 11 months ago
- All Exploit List Made By Me☆17Apr 7, 2025Updated 11 months ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)☆131Dec 16, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Chaos engineering tool written in C/Go to test the resilience of TCP/UDP-based applications within Kubernetes environments, simulating va…☆52Sep 13, 2024Updated last year
- Pwny Cup 2K24 quals challenges writeups☆14Nov 9, 2024Updated last year
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- This tool automates and facilitates an AES CBC BitFlip attack☆18Jan 17, 2024Updated 2 years ago
- The contents of my `.config` folder☆11Mar 16, 2026Updated last week
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 6 months ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Install macOS on an Asus C425 and its variants☆44Oct 7, 2024Updated last year
- CVE-2018-9276 PRTG < 18.2.39 Reverse Shell (Python3 support)☆20Dec 22, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Java Gui Login and Sign Up☆15Apr 13, 2023Updated 2 years ago
- A tool to generate wordlists based on case☆30Nov 24, 2025Updated 4 months ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆43Jan 31, 2026Updated last month
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- CVE-2024-53691☆13Jan 13, 2025Updated last year
- Python script that decodes inject.bin files for the hak5 USB rubber Duck.☆26May 17, 2015Updated 10 years ago
- decrypts Ableton DRM-protected *.aif files☆16Sep 26, 2019Updated 6 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit☆26Dec 29, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Aug 18, 2025Updated 7 months ago
- Different examples of process hollowing.☆14Jul 17, 2020Updated 5 years ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆122Oct 19, 2025Updated 5 months ago
- Code lifting for executing a visionOS library os macOS using QBDL and QBDI☆22Sep 30, 2024Updated last year
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated 2 years ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Sep 21, 2024Updated last year
- 一個關於資訊社群的集散地☆13Sep 17, 2023Updated 2 years ago
- ☆10Apr 13, 2025Updated 11 months ago
- Safely wiping your secure data in Golang☆18Nov 15, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- My public CTF challenge☆17Aug 25, 2025Updated 7 months ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 5 months ago
- Documentation of main privilege escalation vulnerabilities affecting Active Directory.☆16Mar 4, 2026Updated 3 weeks ago
- ☆19May 1, 2025Updated 10 months ago
- IECS213 微處理機系統☆12Dec 12, 2025Updated 3 months ago
- ☆23Jan 27, 2026Updated 2 months ago
- CTF Writeups Backup☆13Nov 4, 2024Updated last year