Bo0oM / CVE-2017-5124View external linksLinks
Chrome < 62 uxss exploit (CVE-2017-5124)
☆160Nov 14, 2017Updated 8 years ago
Alternatives and similar repositories for CVE-2017-5124
Users that are interested in CVE-2017-5124 are comparing it to the libraries listed below
Sorting:
- Webkit uxss exploit (CVE-2017-7089)☆63Oct 3, 2017Updated 8 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Feb 2, 2018Updated 8 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆314Sep 10, 2018Updated 7 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- ☆190Oct 25, 2017Updated 8 years ago
- Running CVE-2017-8759 exploit sample.☆257Jan 23, 2020Updated 6 years ago
- ☆20Oct 22, 2019Updated 6 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- An exploit for Apache Struts CVE-2017-9805☆249Nov 7, 2017Updated 8 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆394Oct 11, 2017Updated 8 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆202Nov 30, 2017Updated 8 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- FileReader Exploit☆256Mar 20, 2019Updated 6 years ago
- X41 Browser Security White Paper - Tools and PoCs☆183Sep 29, 2017Updated 8 years ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- A Javascript library for browser exploitation☆894Feb 12, 2019Updated 7 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆496Nov 29, 2017Updated 8 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- kernel privilege escalation enumeration and exploitation framework☆700Aug 2, 2018Updated 7 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Apr 3, 2017Updated 8 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆406Oct 2, 2020Updated 5 years ago
- ☆13Feb 25, 2014Updated 11 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Feb 7, 2018Updated 8 years ago
- My proof-of-concept exploits for the Linux kernel☆1,556Sep 11, 2025Updated 5 months ago
- 💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002☆353Mar 29, 2019Updated 6 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- CVE-2018-7600 Drupal RCE☆114Apr 18, 2018Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago