HE-Wenjian / iGPU-LeakView external linksLinks
[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU
☆56Apr 6, 2020Updated 5 years ago
Alternatives and similar repositories for iGPU-Leak
Users that are interested in iGPU-Leak are comparing it to the libraries listed below
Sorting:
- A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.☆17Oct 11, 2023Updated 2 years ago
- ☆11Sep 12, 2022Updated 3 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- Scan for evidence of CVE-2021-30860 (FORCEDENTRY) exploit☆11Sep 21, 2021Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Jul 27, 2018Updated 7 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- displays processes, modules and memory layout☆17Aug 4, 2020Updated 5 years ago
- ☆37Jul 14, 2025Updated 7 months ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Feb 6, 2016Updated 10 years ago
- ☆23Aug 22, 2024Updated last year
- ☆20Jul 27, 2020Updated 5 years ago
- Open Source Hardware Designs for working with DisplayPort and intercepting AUX signals.☆19Oct 17, 2019Updated 6 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 5 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Jul 12, 2018Updated 7 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- ☆22Sep 17, 2019Updated 6 years ago
- BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing☆37Jun 26, 2023Updated 2 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- Fuzzilli For quickjs☆28Sep 16, 2019Updated 6 years ago
- A design automation framework to engineer decision diagrams yourself☆25Feb 9, 2026Updated last week
- ☆28Jan 18, 2026Updated 3 weeks ago
- ☆68Jan 6, 2023Updated 3 years ago
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago
- ☆30May 16, 2022Updated 3 years ago
- ☆31Oct 13, 2025Updated 4 months ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- PareidoliaTriggerbot is a hypervisor-based, external Widowmaker triggerbot which uses the VivienneVMM and MouClassInputInjection projects…☆33Nov 3, 2019Updated 6 years ago
- A working busybox for iOS and macOS☆34Nov 13, 2022Updated 3 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- This is a Login application for Android using Parse server.☆10Nov 26, 2018Updated 7 years ago
- Just a single binary no config file Chromium(64bit) updater.☆11May 5, 2018Updated 7 years ago
- GUI Application in C# to run and disassemble shellcode☆36Aug 3, 2017Updated 8 years ago
- Python 3 server used to control SK8RAT implant☆36Jan 5, 2021Updated 5 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆33Sep 2, 2018Updated 7 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Feb 22, 2022Updated 3 years ago
- CVE-2022-24086 about Magento RCE☆36Dec 16, 2022Updated 3 years ago
- OGhidra bridges Large Language Models (LLMs) via Ollama with the Ghidra reverse engineering platform, enabling AI-driven binary analysis …☆107Feb 10, 2026Updated last week
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year