amanszpapaya / MacPer
MacOSX Privilege Escalation Research
☆30Updated 3 years ago
Alternatives and similar repositories for MacPer:
Users that are interested in MacPer are comparing it to the libraries listed below
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Cisco RV110w UPnP stack overflow☆26Updated 3 years ago
- Simple WebSocket fuzzer☆32Updated last year
- ☆13Updated 5 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆34Updated 3 years ago
- Slides from out talk at BH IL 2022☆28Updated 2 years ago
- A repository for my conference presentations☆35Updated 4 years ago
- ☆30Updated 2 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- ☆15Updated 4 years ago
- ☆73Updated 2 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- ☆27Updated 4 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 4 years ago
- ☆24Updated 8 months ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 4 years ago
- ☆16Updated 2 years ago
- ☆20Updated 3 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 2 years ago
- android-inject-hook☆16Updated 6 years ago
- My fuzzing workshop from PHDays9☆27Updated 5 years ago
- ☆14Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 3 weeks ago
- Security Research☆36Updated 3 years ago
- a list of web browser vulnerabilities☆20Updated 4 years ago
- some sploits☆17Updated 4 months ago