RUB-NDS / alpaca-code
Artifacts to the ALPACA attack.
☆60Updated 2 years ago
Alternatives and similar repositories for alpaca-code:
Users that are interested in alpaca-code are comparing it to the libraries listed below
- Linux privilege escalation via LXD☆132Updated 4 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆154Updated last year
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆218Updated 3 years ago
- d(ockerp)wn - a docker pwn tool manager☆155Updated 3 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆61Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 4 years ago
- Generate very tiny reverse shell binaries for Linux~☆75Updated 4 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆158Updated 2 months ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆63Updated 2 years ago
- SNIcat☆126Updated 3 years ago
- ☆24Updated 3 years ago
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆183Updated 2 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆119Updated 2 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆95Updated 2 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆60Updated 5 years ago
- A beginner-friendly CTF about Kubernetes security.☆77Updated 2 years ago
- Script for searching the extracted firmware file system for goodies!☆28Updated 5 years ago
- NAT Slipstream attack code samples☆46Updated 3 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆56Updated 2 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆121Updated 2 years ago
- Proof-of-concept for Spook.js☆69Updated 3 years ago
- bdvl☆111Updated 2 years ago
- Presentations from the CX Security Labs team☆33Updated 3 months ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆111Updated last year
- No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are alread…☆179Updated 3 years ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 4 years ago
- Cisco ASA Software and ASDM Security Research☆80Updated 2 years ago