CVE-2021-3707 , CVE-2021-3708
☆21Jan 21, 2022Updated 4 years ago
Alternatives and similar repositories for DSL-2750U-Full-chain
Users that are interested in DSL-2750U-Full-chain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 4 years ago
- linux debugger☆11Sep 29, 2023Updated 2 years ago
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- CVE-2022-25943☆58Mar 9, 2022Updated 4 years ago
- xiaomi lua anti☆32Jul 8, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Hacking the Linux kernel☆15Jun 17, 2023Updated 2 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Sep 28, 2024Updated last year
- Easily debug processes running in docker containers☆29Jun 22, 2024Updated last year
- fastAPI Simple authentication & Login API using GraphQL and JWT☆31Apr 29, 2024Updated 2 years ago
- A cracker library, much like SentryMBA but with more utilities and uses.☆11Apr 5, 2024Updated 2 years ago
- Syn flood implementation with raw sockets.☆13Nov 24, 2014Updated 11 years ago
- Tool to get NT system shell .☆24Jul 12, 2021Updated 4 years ago
- a collection of elf file infectors☆27Oct 10, 2021Updated 4 years ago
- only for request cve☆18Apr 16, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆13Aug 22, 2022Updated 3 years ago
- Educational collection of LLVM obfuscation passes. (Feel free to use it for your course)☆35Apr 22, 2026Updated 2 weeks ago
- a reliable C based exploit and writeup for CVE-2021-3560.☆40Jun 23, 2021Updated 4 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Simple minimalistic blog for 42 students☆11Dec 20, 2021Updated 4 years ago
- TightVNC Vulnerability.☆16Jan 26, 2022Updated 4 years ago
- ☆14Apr 15, 2026Updated 3 weeks ago
- ☆23Jul 3, 2022Updated 3 years ago
- Minimal PS4 5.05 jailbreak on a ESP32. Compiles in the Arduino IDE.☆16Sep 10, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆112Apr 8, 2024Updated 2 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆18Feb 19, 2017Updated 9 years ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆26Apr 8, 2019Updated 7 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Test your Security Skills, and Clean Code Development as a Pythonist, Hacker & Warrior 🥷🏻☆48Jan 30, 2025Updated last year
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Let's try to create a rootkit!☆19Mar 6, 2020Updated 6 years ago
- A resource center app for iOS jailbreaks and iCloud bypasses!☆14Apr 15, 2023Updated 3 years ago
- My personnal repository☆10Sep 2, 2025Updated 8 months ago
- Chromium web browser for ios with blink instead of webkit☆22Jul 2, 2025Updated 10 months ago
- PlayGround with JWTs used as OAuth 2.0 Bearer Tokens to encode all relevant parts of an access token into the access token itself instead…☆16Aug 21, 2021Updated 4 years ago
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆15Jan 10, 2026Updated 3 months ago