Zeyad-Azima / CVE-2023-26818View external linksLinks
CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram
☆17Jun 6, 2024Updated last year
Alternatives and similar repositories for CVE-2023-26818
Users that are interested in CVE-2023-26818 are comparing it to the libraries listed below
Sorting:
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- POC for CVE-2021-1699☆17Mar 31, 2021Updated 4 years ago
- A pretty fast UDP port scanner☆14Feb 10, 2025Updated last year
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- Only for research and learning, not for commercial and illegal use☆11Jul 22, 2019Updated 6 years ago
- A in-the-wild V8 type confusion bug.☆29Aug 8, 2025Updated 6 months ago
- ☆17Jan 3, 2021Updated 5 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆48Sep 16, 2024Updated last year
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- The WooKey project manifest repository, use repo init -u https://github.com/wookey-project/manifest.git☆17May 28, 2021Updated 4 years ago
- ☆66Aug 15, 2023Updated 2 years ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- CVE-2022-41852 Proof of Concept (unofficial)☆75Oct 20, 2022Updated 3 years ago
- ☆30Jul 18, 2025Updated 6 months ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Neutralize KEPServerEX anti-debugging techniques☆33Feb 15, 2023Updated 3 years ago
- Manjaro LPE☆34Jul 6, 2023Updated 2 years ago
- Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)☆81May 29, 2024Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last week
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ☆39Aug 2, 2024Updated last year
- ☆42Apr 5, 2025Updated 10 months ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- Exploit for the CVE-2024-5806☆45Jun 24, 2024Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 8 months ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ZooKeeper GUI - Desktop Client☆11Jan 27, 2018Updated 8 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago