Meltdown PoC for reading passwords from Google Chrome.
☆470Jan 9, 2018Updated 8 years ago
Alternatives and similar repositories for Meltdown
Users that are interested in Meltdown are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An awesome Data Science repository to learn and apply for real world problems.☆12Nov 17, 2016Updated 9 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- Multithreaded SQL union bruteforcer☆16Sep 9, 2011Updated 14 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- IDA PRO FLIRT signature files MSVC2017的sig文件☆14Apr 9, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A software tool kit to help identify quickly what's inside your binary files.☆14Dec 9, 2024Updated last year
- ☆14Jun 25, 2019Updated 6 years ago
- The androidvulnerabilities.org website and source data☆21Jul 7, 2020Updated 5 years ago
- ☆22Feb 12, 2022Updated 4 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 8 months ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- CVE-2018-3245☆14Oct 25, 2018Updated 7 years ago
- 冰蝎客户端源码☆14Apr 15, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Generic exploit for master key vulnerability in Android☆34Feb 6, 2015Updated 11 years ago
- Script and metasploit module for CVE-2018-15982☆11Aug 12, 2020Updated 5 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- ☆14Mar 10, 2025Updated last year
- PoC binary file of FakeID,with some source code☆46Aug 7, 2014Updated 11 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆19Apr 9, 2018Updated 8 years ago
- My CTF write-ups!☆26Dec 22, 2022Updated 3 years ago
- misc☆17May 26, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tiny C language compiler (x86-64) (WIP)☆32Apr 7, 2026Updated last week
- Backdoor for Windows systems (client and server) writen in C (client) and ASM (server) using reverse connection☆19Jul 6, 2014Updated 11 years ago
- incomplete iOS 10.2 jailbreak for 64 bit devices by qwertyoruiopz and marcograssi☆17Aug 11, 2017Updated 8 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- CTF Writeups☆23May 9, 2018Updated 7 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- A tool which automates and simplifies the on-device fuzzing of MobileSafari.☆24Jan 6, 2016Updated 10 years ago
- Slides for presentations held at conferences☆48Jan 2, 2023Updated 3 years ago
- This is an IDA plugin to recover class information from C++ binary.☆19Aug 4, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🗑 Simple program to uninstall some of the Windows 10 apps, that you cannot remove easily.☆10Jan 11, 2020Updated 6 years ago
- My CTF Writeup☆16Nov 4, 2023Updated 2 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- PowerShell HTTP(s) Intercepting Proxy☆14Sep 30, 2014Updated 11 years ago
- Vulnerability Management with SBOM☆20Updated this week
- Absinthe Jailbreak. Most recent version I've maintained. Help split this up into reusable modules for future userland jailbreaks. This is…☆30Apr 4, 2026Updated last week