This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.
☆146Nov 27, 2022Updated 3 years ago
Alternatives and similar repositories for vulnerability-write-ups
Users that are interested in vulnerability-write-ups are comparing it to the libraries listed below
Sorting:
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Leveraging patch diffing to discover new vulnerabilities☆140Oct 21, 2024Updated last year
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Oct 21, 2024Updated last year
- ☆28Feb 6, 2024Updated 2 years ago
- ☆279Aug 30, 2022Updated 3 years ago
- ☆38Dec 11, 2022Updated 3 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 6 months ago
- ☆44Aug 8, 2022Updated 3 years ago
- ☆152Feb 20, 2023Updated 3 years ago
- ☆180Jul 10, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- Exploit for the CVE-2023-23397☆160Mar 15, 2023Updated 2 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Feb 12, 2025Updated last year
- ☆72Oct 31, 2023Updated 2 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- ☆135Dec 5, 2025Updated 2 months ago
- ☆19Nov 26, 2024Updated last year
- ☆70Jul 6, 2023Updated 2 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆191Updated this week
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆128Aug 11, 2023Updated 2 years ago
- ☆129May 15, 2025Updated 9 months ago
- ☆187Nov 29, 2023Updated 2 years ago
- Intro to Assembly Optimization stream repo☆30Nov 22, 2021Updated 4 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- ☆216Mar 29, 2024Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆151Apr 26, 2024Updated last year
- An automatic Blind ROP exploitation tool☆208Jun 9, 2023Updated 2 years ago
- Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)☆231Nov 20, 2022Updated 3 years ago
- ☆27Nov 7, 2023Updated 2 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- A public collection of POCs & Exploits for the vulnerabilities I discovered☆407Dec 31, 2025Updated 2 months ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,279Jan 29, 2026Updated last month
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆355Updated this week
- Python Command-Line Ghidra Binary Diffing Engine☆740Sep 25, 2025Updated 5 months ago
- ☆163Oct 25, 2023Updated 2 years ago
- Windows And Ways To Break It☆100Jan 28, 2026Updated last month