RCE PoC for Tensorflow using a malicious Lambda layer
☆61Jul 30, 2025Updated 8 months ago
Alternatives and similar repositories for tensorflow-rce
Users that are interested in tensorflow-rce are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 11 months ago
- Recursos y materiales vistos, usados, en el taller de Introducción al Hacking Ético, que ha sido impartido por Jesús Eduardo Lugo Vela y …☆14Mar 14, 2024Updated 2 years ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆40Nov 11, 2025Updated 4 months ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- QL-Relax☆13Aug 12, 2025Updated 7 months ago
- Resources and notes for Offensive Security's SOC-200 course and OffSec Defense Analyst (OSDA) exam☆17May 19, 2023Updated 2 years ago
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆17Aug 2, 2024Updated last year
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 7 months ago
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated 2 years ago
- a mechanism to transfer digital credentials securely between two devices☆12Feb 14, 2023Updated 3 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 南开大学教学管理系统安卓客户端☆10Jan 20, 2014Updated 12 years ago
- 一个通过提取 fuzz crash 触发的调用堆栈 hash, 来动态分类的小工具☆15Nov 24, 2021Updated 4 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆63Nov 16, 2022Updated 3 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 10 months ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- ☆15Jan 2, 2026Updated 3 months ago
- 龙芯官 方给出的MIPS源码与我个人优化文件结构之后的源码☆15May 3, 2019Updated 6 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0☆17Sep 17, 2023Updated 2 years ago
- Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071☆20Nov 5, 2025Updated 5 months ago
- nativeRasp that can hook native methods☆23Apr 24, 2023Updated 2 years ago
- ☆11Feb 7, 2023Updated 3 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- ☆36May 13, 2022Updated 3 years ago
- Simple veracrypt container cracker using wordlist☆17May 14, 2021Updated 4 years ago
- NCTF 2024 challenges and writeups☆10Apr 11, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 10 years ago
- 特征脸☆17Dec 2, 2018Updated 7 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 7 months ago
- ☆22Apr 11, 2025Updated 11 months ago
- ☆30Oct 13, 2025Updated 5 months ago