OllaPapito / gameoverlayView external linksLinks
CVE-2023-2640 CVE-2023-32629
☆13Aug 15, 2023Updated 2 years ago
Alternatives and similar repositories for gameoverlay
Users that are interested in gameoverlay are comparing it to the libraries listed below
Sorting:
- GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0☆17Sep 17, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ☆16Sep 4, 2024Updated last year
- My Blog - https://0xresetti.github.io☆11Jan 31, 2026Updated 2 weeks ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated 11 months ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ☆12Nov 29, 2024Updated last year
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Source Code for AI Telegram Bot, Using Rest API Website https://api-miftah.xyz, Don't Forget to Give Stars ⭐☆10Oct 24, 2023Updated 2 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- 练习Golang的时候写 的一个Ysoserial图形化工具☆11Aug 1, 2023Updated 2 years ago
- 一款冰蝎内存马清除工具;冰蝎内存马卸载工具 ;内存马的查杀功能有待实现。☆12Aug 20, 2023Updated 2 years ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- Dante socks proxy + FreeRadius + DaloRadius + MySQL + phpMyAdmin☆10Aug 29, 2017Updated 8 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Puppeteer Recaptcha solver☆10Jan 10, 2024Updated 2 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- ☆10Sep 10, 2022Updated 3 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- ☆16Jun 21, 2024Updated last year
- ☆10Oct 4, 2023Updated 2 years ago
- YesMan☆16Nov 8, 2023Updated 2 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Our interviewing prep resources.☆10Jan 12, 2016Updated 10 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Rewriting Proxy for HTML and Javascript. Towards a Self-healing Web.☆13Jul 28, 2020Updated 5 years ago
- All combinations of various characters, to get the desired word☆18Dec 13, 2023Updated 2 years ago
- Spirit PacketPuller is a GUI tool that analyses IDA-generated pseudocode from MapleStory client decompiles, to yield packet structure and…☆14Oct 17, 2020Updated 5 years ago
- Implement CollAFL using LLVM LTO pass on afl++.☆12Sep 24, 2020Updated 5 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- BurpSuite dockerized☆11Mar 2, 2018Updated 7 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆10Jun 27, 2018Updated 7 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 4 months ago