RCE PoC for Tensorflow using a malicious Lambda layer
☆61Jul 30, 2025Updated 7 months ago
Alternatives and similar repositories for tensorflow-rce
Users that are interested in tensorflow-rce are comparing it to the libraries listed below
Sorting:
- ☆11Dec 19, 2024Updated last year
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 10 months ago
- red team tips and trix☆12Jun 27, 2025Updated 8 months ago
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated last year
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- Recursos y materiales vistos, usados, en el taller de Introducción al Hacking Ético, que ha sido impartido por Jesús Eduardo Lugo Vela y …☆14Mar 14, 2024Updated last year
- Signature Transparency Log designed for ease of use, low cost, and minimal maintenance☆31Updated this week
- ☆18Aug 5, 2020Updated 5 years ago
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 6 months ago
- justCTF 2023 challenges sources☆20Jun 26, 2023Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Aug 5, 2023Updated 2 years ago
- ☆34Apr 14, 2025Updated 10 months ago
- nativeRasp that can hook native methods☆24Apr 24, 2023Updated 2 years ago
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆17Jun 22, 2025Updated 8 months ago
- Neutralize KEPServerEX anti-debugging techniques☆33Feb 15, 2023Updated 3 years ago
- ☆36May 13, 2022Updated 3 years ago
- ☆35Oct 25, 2021Updated 4 years ago
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10May 20, 2025Updated 9 months ago
- Log monitor for Rekor to verify immutability and monitor entries☆47Updated this week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 2 weeks ago
- a hackbot proof-of-concept☆41Feb 24, 2024Updated 2 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- Les réflexions menées au cours du 404CTF 2023 pour résoudre les challenges proposés☆10Dec 16, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- CTF pwn problem writeup☆40Apr 23, 2023Updated 2 years ago
- Protection against Model Serialization Attacks☆646Feb 18, 2026Updated last week
- ☆11Jul 15, 2024Updated last year
- ☆14Sep 1, 2024Updated last year
- A cross-platform and editor-agnostic live previewer for Markdown files☆10Jul 15, 2024Updated last year
- Docker file for pwn env. (ubuntu16.04/18.04/18.10)☆10Aug 19, 2021Updated 4 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- Delay Differential Equations in Haskell☆11Dec 4, 2018Updated 7 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated last month
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago