RCE PoC for Tensorflow using a malicious Lambda layer
☆61Jul 30, 2025Updated 9 months ago
Alternatives and similar repositories for tensorflow-rce
Users that are interested in tensorflow-rce are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Dec 19, 2024Updated last year
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆32Mar 27, 2025Updated last year
- Recursos y materiales vistos, usados, en el taller de Introducción al Hacking Ético, que ha sido impartido por Jesús Eduardo Lugo Vela y …☆14Mar 14, 2024Updated 2 years ago
- red team tips and trix☆12Jun 27, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆41Nov 11, 2025Updated 5 months ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆17Mar 30, 2024Updated 2 years ago
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆17Aug 2, 2024Updated last year
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 8 months ago
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated 2 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 一个通过提取 fuzz crash 触发的调用堆栈 hash, 来动态分类的小工具☆15Nov 24, 2021Updated 4 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 11 months ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 5 years ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- ☆15Jan 2, 2026Updated 3 months ago
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10May 20, 2025Updated 11 months ago
- 龙芯官方给出的MIPS源码与我个人优化文件结构之后的源码☆15May 3, 2019Updated 6 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆29Nov 29, 2022Updated 3 years ago
- GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0☆17Sep 17, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071☆20Nov 5, 2025Updated 5 months ago
- nativeRasp that can hook native methods☆23Apr 24, 2023Updated 3 years ago
- justCTF 2023 challenges sources☆20Jun 26, 2023Updated 2 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆266Mar 2, 2026Updated last month
- RCE Exploit For Maltrail-v0.53☆56Updated this week
- ☆36May 13, 2022Updated 3 years ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- Simple veracrypt container cracker using wordlist☆17May 14, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 10 years ago
- Two-Level Collaborative Fuzzing for Python Runtimes☆19Nov 25, 2023Updated 2 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 7 months ago
- Signature Transparency Log designed for ease of use, low cost, and minimal maintenance☆37Updated this week
- ☆30Oct 13, 2025Updated 6 months ago
- Grafana RCE exploit (CVE-2024-9264)☆38Oct 21, 2024Updated last year