RCE PoC for Tensorflow using a malicious Lambda layer
☆61Jul 30, 2025Updated 7 months ago
Alternatives and similar repositories for tensorflow-rce
Users that are interested in tensorflow-rce are comparing it to the libraries listed below
Sorting:
- ☆11Dec 19, 2024Updated last year
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆30Mar 27, 2025Updated 11 months ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 11 months ago
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆17Mar 30, 2024Updated last year
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 6 months ago
- Demo showing Claude Opus does not find CVE-2023-0266☆17Mar 19, 2024Updated 2 years ago
- ☆22Dec 1, 2021Updated 4 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- 南开大学教学管理系统安卓客户端☆10Jan 20, 2014Updated 12 years ago
- 一 个通过提取 fuzz crash 触发的调用堆栈 hash, 来动态分类的小工具☆15Nov 24, 2021Updated 4 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆62Nov 16, 2022Updated 3 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- ☆14Jan 2, 2026Updated 2 months ago
- 龙芯官方给出的MIPS源码与我个人优化文件结构之后的源码☆15May 3, 2019Updated 6 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated last month
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071☆20Nov 5, 2025Updated 4 months ago
- nativeRasp that can hook native methods☆23Apr 24, 2023Updated 2 years ago
- justCTF 2023 challenges sources☆20Jun 26, 2023Updated 2 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆253Mar 2, 2026Updated 2 weeks ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- NCTF 2024 challenges and writeups☆10Apr 11, 2025Updated 11 months ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Two-Level Collaborative Fuzzing for Python Runtimes☆19Nov 25, 2023Updated 2 years ago
- 特征脸☆17Dec 2, 2018Updated 7 years ago
- Signature Transparency Log designed for ease of use, low cost, and minimal maintenance☆33Updated this week
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 6 months ago
- ☆22Apr 11, 2025Updated 11 months ago
- ☆30Oct 13, 2025Updated 5 months ago
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- ECMAScript source modification tool☆62Feb 6, 2016Updated 10 years ago
- Snyk Node Runtime Agent☆16Apr 12, 2022Updated 3 years ago