All my public vulnerabilities.
☆14Jan 9, 2021Updated 5 years ago
Alternatives and similar repositories for Public-Vulnerabilities
Users that are interested in Public-Vulnerabilities are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A research project about Windows notify routines.☆38Jul 31, 2020Updated 5 years ago
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- lowlevel cyber course - riscv & i8086 competition☆11Jan 12, 2019Updated 7 years ago
- A simple kernel written in Rust for studying purposes.☆52May 6, 2018Updated 7 years ago
- A virtualization-based endpoint security solution for Windows☆88May 23, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 5 years ago
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Aug 13, 2020Updated 5 years ago
- 8086 Assembly Chess☆11Feb 11, 2019Updated 7 years ago
- Create customized callgraph directly from your favorite IDE☆80Feb 13, 2026Updated 2 months ago
- Abandoned overcomplicated Microkernel using modern x86_64 features☆41Oct 27, 2020Updated 5 years ago
- Collection of resources about Virtualization☆10Nov 14, 2019Updated 6 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- A Python Vision Library for object tracking in the 3D physical space☆11Oct 17, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- My customized docker image used for binary exploitation and RE☆14Jul 3, 2021Updated 4 years ago
- ☆31May 16, 2019Updated 6 years ago
- Show syscall information for different architectures☆15Aug 26, 2017Updated 8 years ago
- An automatic tool for fixing dumped PE files☆40Jul 28, 2020Updated 5 years ago
- Reverse engineering project on stream☆13Mar 19, 2021Updated 5 years ago
- TLB splitting VMM☆171May 17, 2016Updated 9 years ago
- An iOS open source project for the great site that gives you indication about the average iOS / MacOS app stores review times.☆14Mar 30, 2018Updated 8 years ago
- Windows Pwnable Study☆414Jun 16, 2025Updated 9 months ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Oct 21, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆11Dec 28, 2019Updated 6 years ago
- AWS lambda functions - utilities☆12Jul 8, 2017Updated 8 years ago
- android kernel pwn☆22Feb 14, 2019Updated 7 years ago
- A mansplaining tool for bourne-like shells☆11Feb 2, 2020Updated 6 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- This is an instruction to run your own SMM code.☆109Mar 8, 2021Updated 5 years ago
- Rashi Plus Plus - the new Hebrew scripting language☆98May 17, 2021Updated 4 years ago
- Yes, it's a camel case.☆16Mar 1, 2020Updated 6 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Load function names from an IDA Pro database inside GDB☆21Oct 20, 2018Updated 7 years ago
- Makes dynamic linked shit "static". Amazing☆26Mar 23, 2021Updated 5 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- IPC scripts for access to Intel CRBUS☆121Aug 6, 2021Updated 4 years ago
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- Simple Protected Mode Kernel for i386☆16Dec 30, 2019Updated 6 years ago
- An implementation of the Process Hollowing technique.☆16Dec 13, 2020Updated 5 years ago