Record vulnerabilities and tricks found by me or my team.
☆19Mar 31, 2021Updated 5 years ago
Alternatives and similar repositories for Vulns
Users that are interested in Vulns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- records of my daily sec learning☆13Mar 20, 2020Updated 6 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- CVE-2020-8515-PoC☆14Mar 30, 2020Updated 6 years ago
- ☆20Jan 25, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆20Mar 21, 2019Updated 7 years ago
- ☆16Dec 15, 2023Updated 2 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- ☆26Dec 12, 2018Updated 7 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 6 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Dec 29, 2020Updated 5 years ago
- The CTF challenges that I made☆18Mar 31, 2023Updated 3 years ago
- ☆10Mar 6, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- ☆10Aug 27, 2020Updated 5 years ago
- Script to setup pwn environment with Docker☆50Jan 10, 2026Updated 3 months ago
- linux system call hook framework☆48Jan 18, 2019Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - Bugzilla Bug Monitor for JS shell bugs☆19Oct 21, 2019Updated 6 years ago
- Python bindings for calling radamsa mutators☆27Feb 21, 2026Updated last month
- xiaomi lua anti☆31Jul 8, 2020Updated 5 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆36Jun 21, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- attachments for forum of RealWorld CTF 3rd☆42Jan 7, 2021Updated 5 years ago
- use for unlock research☆25Apr 13, 2023Updated 3 years ago
- ☆19Sep 7, 2025Updated 7 months ago
- CVE-2020-8597 pppd buffer overflow poc☆49Mar 12, 2020Updated 6 years ago
- ☆12Jun 14, 2023Updated 2 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆120Jan 9, 2023Updated 3 years ago
- Some Vulnerability in the some protocol are collected.☆109May 29, 2024Updated last year
- awesome iot exploit resource☆72Jul 15, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13Aug 9, 2017Updated 8 years ago
- 金蝶云星空 erp反序列化命令执行漏洞批量扫描POC&EXP,带命令回显☆33Jul 20, 2023Updated 2 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 6 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆344Dec 12, 2024Updated last year
- An IDA Toolkit for analyzing iOS kernelcaches.☆112May 15, 2025Updated 10 months ago
- IoT漏洞检测平台,支持固件第三方库版本分析。移动安全相关功能移至SecMobile。☆116Jun 22, 2020Updated 5 years ago