A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)
☆13May 2, 2019Updated 6 years ago
Alternatives and similar repositories for CVE-2019-5624
Users that are interested in CVE-2019-5624 are comparing it to the libraries listed below
Sorting:
- ☆18Dec 4, 2018Updated 7 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- ☆14Jan 24, 2016Updated 10 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- Totally legitimate☆11May 15, 2019Updated 6 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/burp-extensions☆10Feb 18, 2020Updated 6 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- Example project demonstrating some kind of OpenSSL certificate pinning. Related to blogpost at TKTK showing how to bypass such pinning.☆19Jan 2, 2015Updated 11 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆35Jun 15, 2017Updated 8 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- PCILeech HP iLO4 Service☆24Jan 9, 2019Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- ☆24Nov 3, 2019Updated 6 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 3 months ago
- Security Research☆94Jul 2, 2025Updated 8 months ago
- ☆47May 18, 2020Updated 5 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- EditBox is a plugin for the Volatility Framework. It extracts the text from Windows Edit controls, that is, textboxes as generated by Win…☆24Jun 4, 2017Updated 8 years ago