RootUp / PHDays9
My fuzzing workshop from PHDays9
☆27Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for PHDays9
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated 10 months ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- ☆24Updated 4 years ago
- ☆27Updated 4 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- A repository for my conference presentations☆35Updated 4 years ago
- sploit☆67Updated 4 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆32Updated 5 years ago
- Remote Java classpath enumeration via deserialization☆22Updated last year
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- ☆34Updated 5 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆49Updated 5 years ago
- Security Research☆36Updated 2 years ago
- ☆20Updated 5 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Updated 4 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated 10 months ago
- Dockerfiles for (un)popular fuzzers!☆28Updated 4 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- CVE-2019-12949☆26Updated 5 years ago
- Study about HQL injection exploitation.☆49Updated 8 years ago
- Some of my public exploits☆50Updated 4 years ago
- public exploits☆35Updated last year
- Full TTY reverse shell over SSH☆57Updated 4 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- ☆63Updated 5 years ago