Linux Kernel Exploit, a PoC ( Proof of Concept )
☆20Mar 5, 2018Updated 8 years ago
Alternatives and similar repositories for Localroot-All-CVE
Users that are interested in Localroot-All-CVE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Oct 11, 2017Updated 8 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆15Sep 9, 2012Updated 13 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Apr 30, 2023Updated 3 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆102Nov 24, 2019Updated 6 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Sep 12, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆13Apr 19, 2019Updated 7 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 7 years ago
- Python Script to quickly check if a host is running NetScaler Gateway and/or AAA☆12Jul 27, 2023Updated 2 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian☆57Dec 13, 2021Updated 4 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 9 years ago
- [ICSE2020] UAFL DataSet☆12Dec 10, 2022Updated 3 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Security Research☆36Dec 23, 2021Updated 4 years ago
- ☆14Updated this week
- ☆22Jul 6, 2018Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆16Apr 6, 2023Updated 3 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- A sample POC for CVE-2021-30657 affecting MacOS☆30Nov 8, 2021Updated 4 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Extensible Platform for Malware Analysis☆17Jan 14, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 10 months ago
- ☆16Feb 25, 2024Updated 2 years ago
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆40Aug 12, 2025Updated 8 months ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆10Aug 21, 2018Updated 7 years ago
- cinspector - a static C source code analysis framework☆29Jun 20, 2024Updated last year
- This program show you IMSI numbers of cellphones around you.☆13Dec 14, 2017Updated 8 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Jun 8, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆37Jul 14, 2025Updated 9 months ago
- Collection My Wordlist☆122Feb 4, 2017Updated 9 years ago
- DragonNest .pak extraction via quickbms script☆17May 18, 2015Updated 10 years ago
- Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already…☆14Oct 17, 2018Updated 7 years ago
- Easy way to brute-force web directory.☆163Jun 2, 2019Updated 6 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- CVE-2018-4407 IOS/macOS kernel crash☆13Feb 23, 2019Updated 7 years ago