Mote-Z / rootkitLinks
☆17Updated 5 years ago
Alternatives and similar repositories for rootkit
Users that are interested in rootkit are comparing it to the libraries listed below
Sorting:
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆36Updated 2 years ago
- ☆32Updated 3 months ago
- ☆16Updated last year
- ☆153Updated 2 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 years ago
- ☆37Updated last year
- PoC for CVE-2023-28771 based on Rapid7's excellent writeup☆29Updated 2 years ago
- Collection of slides☆33Updated last year
- Foxit PDF Reader Remote Code Execution Exploit☆117Updated last year
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- VM Escape for Parallels Desktop <18.1.1☆37Updated 2 years ago
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Updated 2 years ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆45Updated 6 months ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Updated 10 months ago
- Windows Common Log File System Driver POC☆95Updated 3 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆36Updated 2 years ago
- Slides from out talk at BH IL 2022☆28Updated 3 years ago
- ☆48Updated 2 years ago
- Proof-of-Concept for CVE-2024-21345☆74Updated last year
- PoC Exploit for VM2 Sandbox Escape Vulnerability☆47Updated last year
- ☆61Updated 3 years ago
- CVE-2021-33909 Sequoia☆44Updated 3 years ago
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆92Updated 5 months ago
- POC for CLFS CVE-2022-24481☆14Updated 2 years ago
- Exploit of RealVNC VNC Server☆28Updated 2 years ago
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆28Updated 3 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆25Updated 2 months ago
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆57Updated 2 years ago
- Universal root exploit for the linux kernel☆33Updated last year
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆48Updated 4 months ago