YuriiCrimson / ExploitGSM
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
☆832Updated 5 months ago
Related projects: ⓘ
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,241Updated 5 months ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆672Updated 7 months ago
- a signal handler race condition in OpenSSH's server (sshd)☆458Updated 2 months ago
- Differential fuzzing REPL for HTTP implementations.☆697Updated last week
- PoC for CVE-2023-4911☆377Updated 11 months ago
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆461Updated last year
- Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]☆487Updated 7 months ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆574Updated 3 weeks ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆1,944Updated last month
- I-SOON/Anxun leak related stuff☆264Updated 6 months ago
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,483Updated 5 months ago
- Exploit PoC for CVE-2024-32002☆486Updated 4 months ago
- ☆312Updated 9 months ago
- Navigate the CVE jungle with ease.☆1,622Updated this week
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,390Updated 3 weeks ago
- ☆629Updated 2 months ago
- LLM powered fuzzing via OSS-Fuzz.☆814Updated this week
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆499Updated 3 months ago
- Provides automated reverse engineering assistance through the use of local large language models (LLMs) on consumer hardware.☆785Updated 2 months ago
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆382Updated 2 months ago
- A minimal TLS 1.2 client implementation in a pure Bash script☆337Updated 10 months ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆314Updated 5 months ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆931Updated 6 months ago
- CVE-2023-38831 winrar exploit generator☆782Updated 9 months ago
- This repository presents a proof-of-concept of CVE-2023-7028☆233Updated 8 months ago
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆1,856Updated 3 months ago
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆106Updated last month
- KVM Backend for VirtualBox. With our current development model, we cannot easily accept pull requests here. If you'd like to contribute, …☆920Updated 3 weeks ago
- The Network Execution Tool☆2,839Updated last week
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,153Updated last month