Linux Kernel Exploit, a PoC ( Proof of Concept )
☆20Mar 5, 2018Updated 8 years ago
Alternatives and similar repositories for Localroot-All-CVE
Users that are interested in Localroot-All-CVE are comparing it to the libraries listed below
Sorting:
- ☆14Oct 11, 2017Updated 8 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Sep 12, 2017Updated 8 years ago
- ☆13Apr 19, 2019Updated 6 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 6 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian☆57Dec 13, 2021Updated 4 years ago
- 蜜罐捕获的数据☆12May 16, 2016Updated 9 years ago
- Say incantations to enjoy web designing.☆11Mar 9, 2018Updated 8 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- ☆14Mar 9, 2026Updated last week
- ☆22Jul 6, 2018Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆16Apr 6, 2023Updated 2 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Extensible Platform for Malware Analysis☆17Jan 14, 2021Updated 5 years ago
- ☆42Oct 26, 2022Updated 3 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 9 months ago
- ☆16Feb 25, 2024Updated 2 years ago
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆40Aug 12, 2025Updated 7 months ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)