Security advisories published by Enable Security
☆45Feb 3, 2026Updated last month
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below
Sorting:
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- Build your own cloud virtual machine lab☆12Nov 25, 2025Updated 3 months ago
- A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.☆17Oct 11, 2023Updated 2 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆31Aug 2, 2025Updated 7 months ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- TCP port multiplexer: run multiple services through the same port☆15Sep 21, 2013Updated 12 years ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 5 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- Exploit code developed/reproduced by me☆90Jan 25, 2023Updated 3 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- ☆11Jan 28, 2025Updated last year
- intel amt honeypot☆18May 9, 2017Updated 8 years ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Jun 6, 2024Updated last year
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- CVE-2018-2628☆20Apr 18, 2018Updated 7 years ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- ☆21Dec 1, 2021Updated 4 years ago
- Sample code for DNS spoofing with ARP poisoning.☆21Mar 21, 2015Updated 10 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- Record vulnerabilities and tricks found by me or my team.☆19Mar 31, 2021Updated 4 years ago
- Study about HQL injection exploitation.☆51May 15, 2016Updated 9 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- ☆22Mar 14, 2024Updated last year
- *For research purposes only*. Some proof of concept code to trig vulnerability or exploit them that I found before.☆25Oct 24, 2025Updated 4 months ago
- ☆25Jul 5, 2018Updated 7 years ago
- A script that inspects multi-byte character sets looking for characters with specific user-defined properties☆27Jun 23, 2016Updated 9 years ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- Our publications of the Swiss E-Voting Public Intrusion Test (PIT)☆47Mar 12, 2019Updated 6 years ago