Splinter0 / tensorflow-rceLinks
RCE PoC for Tensorflow using a malicious Lambda layer
☆60Updated 6 months ago
Alternatives and similar repositories for tensorflow-rce
Users that are interested in tensorflow-rce are comparing it to the libraries listed below
Sorting:
- CVE-2023-33733 reportlab RCE☆119Updated 2 years ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆117Updated last week
- Vulnerabilities Exploitation On Ubuntu 22.04☆48Updated 2 years ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆159Updated last year
- ☆96Updated 6 months ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆140Updated 8 months ago
- CVE-2024-3400 Palo Alto OS Command Injection☆161Updated last year
- Some tips for Bug Bounty using LibreOffice☆55Updated 11 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated last year
- TLDRBins is a repo for cybersecurity researchers to quick search for commands.☆30Updated 2 months ago
- A list of all Active Directory machines from HackTheBox☆212Updated last week
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆132Updated last month
- Vulnerable environments paired with ready-to-use Nuclei templates for security testing and learning! 🚀☆125Updated 6 months ago
- SharePoint WebPart Injection Exploit Tool☆311Updated 2 months ago
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆134Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆180Updated 2 years ago
- Official writeups for Hack The Boo CTF 2023☆45Updated last year
- Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640☆106Updated 2 years ago
- ☆59Updated 2 years ago
- Exploitation of CVE-2026-24061☆184Updated 2 weeks ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆27Updated last year
- ☆59Updated last year
- CVE-2023-2255 Libre Office☆63Updated 2 years ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆103Updated 6 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆115Updated last year
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆211Updated 2 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆88Updated last week
- POC for CVE-2021-41091☆65Updated 2 years ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆221Updated 9 months ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆113Updated 8 months ago