Record vulnerabilities and tricks found by me or my team.
☆19Mar 31, 2021Updated 4 years ago
Alternatives and similar repositories for Vulns
Users that are interested in Vulns are comparing it to the libraries listed below
Sorting:
- records of my daily sec learning☆13Mar 20, 2020Updated 5 years ago
- ☆20Jan 25, 2022Updated 4 years ago
- CVE-2020-8515-PoC☆14Mar 30, 2020Updated 5 years ago
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- ☆27Dec 12, 2018Updated 7 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- ☆10Aug 27, 2020Updated 5 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆10Sep 1, 2021Updated 4 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Dec 29, 2020Updated 5 years ago
- ☆16Dec 15, 2023Updated 2 years ago
- INACTIVE - http://mzl.la/ghe-archive - Bugzilla Bug Monitor for JS shell bugs☆19Oct 21, 2019Updated 6 years ago
- xiaomi lua anti☆33Jul 8, 2020Updated 5 years ago
- Script to setup pwn environment with Docker☆47Jan 10, 2026Updated last month
- The CTF challenges that I made☆18Mar 31, 2023Updated 2 years ago
- use for unlock research☆25Apr 13, 2023Updated 2 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆20Mar 21, 2019Updated 6 years ago
- attachments for forum of RealWorld CTF 3rd☆42Jan 7, 2021Updated 5 years ago
- CVE-2020-8597 pppd buffer overflow poc☆49Mar 12, 2020Updated 5 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- An unauthenticated PoC for CVE-2020-0796☆22Mar 15, 2020Updated 5 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- linux system call hook framework☆47Jan 18, 2019Updated 7 years ago
- ☆26Mar 17, 2021Updated 4 years ago
- Some Vulnerability in the some protocol are collected.☆109May 29, 2024Updated last year
- Python bindings for calling radamsa mutators☆27Feb 21, 2026Updated last week
- PoC code for CVE-2019-14040☆27Apr 15, 2020Updated 5 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- The tools used to train the models used for the ICISC paper "Recurrent neural networks for fuzz testing web browsers"☆27Nov 29, 2018Updated 7 years ago
- awesome iot exploit resource☆72Jul 15, 2024Updated last year
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆339Dec 12, 2024Updated last year
- ☆33Nov 14, 2025Updated 3 months ago
- ☆22Sep 17, 2019Updated 6 years ago
- linux kernel cross page attack demo module☆31Mar 15, 2023Updated 2 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆119Jan 9, 2023Updated 3 years ago
- RealWorld CTF 3rd billboard challenge & writeup☆27Jan 6, 2023Updated 3 years ago
- poc for cve-2020-0022☆67Jul 16, 2020Updated 5 years ago