A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)
☆13May 2, 2019Updated 6 years ago
Alternatives and similar repositories for CVE-2019-5624
Users that are interested in CVE-2019-5624 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/burp-extensions☆10Feb 18, 2020Updated 6 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆13Jul 14, 2020Updated 5 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- ☆14Jan 24, 2016Updated 10 years ago
- Random experiments and shenanigans☆13Dec 6, 2025Updated 3 months ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Totally legitimate☆11May 15, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆11Mar 12, 2021Updated 5 years ago
- ☆36Feb 17, 2020Updated 6 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- ☆12Nov 17, 2024Updated last year
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- de4dot mod by HTC & Ngôn Nguyễn☆28Aug 18, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆35Jun 15, 2017Updated 8 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE☆63Jun 1, 2023Updated 2 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 9 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- Mac OSX application to control the DNSCrypt Proxy☆12Oct 7, 2017Updated 8 years ago
- sploit☆67Dec 21, 2019Updated 6 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆25Aug 21, 2023Updated 2 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆68Feb 3, 2020Updated 6 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- PCILeech HP iLO4 Service☆24Jan 9, 2019Updated 7 years ago