All my public vulnerabilities.
☆14Jan 9, 2021Updated 5 years ago
Alternatives and similar repositories for Public-Vulnerabilities
Users that are interested in Public-Vulnerabilities are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- lowlevel cyber course - riscv & i8086 competition☆11Jan 12, 2019Updated 7 years ago
- A simple kernel written in Rust for studying purposes.☆52May 6, 2018Updated 7 years ago
- A virtualization-based endpoint security solution for Windows☆88May 23, 2021Updated 4 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 5 years ago
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Aug 13, 2020Updated 5 years ago
- 8086 Assembly Chess☆11Feb 11, 2019Updated 7 years ago
- Create customized callgraph directly from your favorite IDE☆81Feb 13, 2026Updated last month
- Abandoned overcomplicated Microkernel using modern x86_64 features☆41Oct 27, 2020Updated 5 years ago
- A tool for Windows that can make any program work within file-system transactions.☆59Nov 12, 2020Updated 5 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Show syscall information for different architectures☆15Aug 26, 2017Updated 8 years ago
- Reverse engineering project on stream☆13Mar 19, 2021Updated 5 years ago
- Windows Pwnable Study☆412Jun 16, 2025Updated 9 months ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Oct 21, 2018Updated 7 years ago
- ☆11Dec 28, 2019Updated 6 years ago
- AWS lambda functions - utilities☆12Jul 8, 2017Updated 8 years ago
- android kernel pwn☆22Feb 14, 2019Updated 7 years ago
- A mansplaining tool for bourne-like shells☆11Feb 2, 2020Updated 6 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- Rashi Plus Plus - the new Hebrew scripting language☆96May 17, 2021Updated 4 years ago
- This is an instruction to run your own SMM code.☆109Mar 8, 2021Updated 5 years ago
- Yes, it's a camel case.☆16Mar 1, 2020Updated 6 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Load function names from an IDA Pro database inside GDB☆21Oct 20, 2018Updated 7 years ago
- Makes dynamic linked shit "static". Amazing☆26Mar 23, 2021Updated 5 years ago
- IPC scripts for access to Intel CRBUS☆121Aug 6, 2021Updated 4 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- Simple Protected Mode Kernel for i386☆15Dec 30, 2019Updated 6 years ago
- RPC Monitor based on The ETW Microsoft-Windows-Rpc provider☆23Mar 22, 2020Updated 6 years ago
- Repository for dealing with Malloc mangling functions☆12Jun 11, 2020Updated 5 years ago
- Chrome extension that battles fake news☆14Sep 16, 2018Updated 7 years ago
- Install UI for Arch Linux☆22Nov 3, 2021Updated 4 years ago
- Exploit for setuid() vulnerability in Android Zygote☆25Mar 16, 2011Updated 15 years ago
- Bash scripts to setup OpenStack on Virtuozzo 7☆13Jun 1, 2018Updated 7 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- ☆20Mar 20, 2022Updated 4 years ago