CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram
☆17Jun 6, 2024Updated last year
Alternatives and similar repositories for CVE-2023-26818
Users that are interested in CVE-2023-26818 are comparing it to the libraries listed below
Sorting:
- Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability☆10Jul 12, 2024Updated last year
- A pretty fast UDP port scanner☆14Feb 10, 2025Updated last year
- Only for research and learning, not for commercial and illegal use☆11Jul 22, 2019Updated 6 years ago
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 7 months ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- The WooKey project manifest repository, use repo init -u https://github.com/wookey-project/manifest.git☆17May 28, 2021Updated 4 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆27May 8, 2023Updated 2 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- CVE-2022-41852 Proof of Concept (unofficial)☆75Oct 20, 2022Updated 3 years ago
- ☆30Jul 18, 2025Updated 7 months ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Neutralize KEPServerEX anti-debugging techniques☆33Feb 15, 2023Updated 3 years ago
- Manjaro LPE☆34Jul 6, 2023Updated 2 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆235Sep 26, 2023Updated 2 years ago
- ☆41Apr 5, 2025Updated 11 months ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 9 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- Exploit for the CVE-2024-5806☆45Jun 24, 2024Updated last year
- ☆10May 12, 2022Updated 3 years ago
- Clases de Implantación de Sistemas Operativos☆26Updated this week
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ZooKeeper GUI - Desktop Client☆11Jan 27, 2018Updated 8 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago