This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.
☆147Nov 27, 2022Updated 3 years ago
Alternatives and similar repositories for vulnerability-write-ups
Users that are interested in vulnerability-write-ups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Leveraging patch diffing to discover new vulnerabilities☆140Oct 21, 2024Updated last year
- ☆282Aug 30, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Oct 31, 2023Updated 2 years ago
- ☆152Feb 20, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆188Nov 29, 2023Updated 2 years ago
- ☆38Dec 11, 2022Updated 3 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- ☆28Feb 6, 2024Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆47Dec 22, 2023Updated 2 years ago
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 8 months ago
- ☆38Apr 7, 2023Updated 3 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Linux Kernel N-day Exploit/Analysis.☆64Oct 21, 2024Updated last year
- ☆180Jul 10, 2023Updated 2 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- ☆44Aug 8, 2022Updated 3 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆129Aug 11, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- ☆12Aug 5, 2021Updated 4 years ago
- ☆137Dec 5, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- ☆216Mar 29, 2024Updated 2 years ago
- ☆70Jul 6, 2023Updated 2 years ago
- ☆239Feb 26, 2023Updated 3 years ago
- ☆38Jan 6, 2025Updated last year
- ☆19Nov 26, 2024Updated last year
- Flopz - Firmware Liberation on Python☆14Jun 22, 2024Updated last year
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,286Jan 29, 2026Updated 2 months ago
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆374Apr 5, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated 2 years ago
- ☆71Oct 31, 2023Updated 2 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)☆233Nov 20, 2022Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆35Nov 18, 2020Updated 5 years ago
- ☆15Jun 23, 2024Updated last year
- POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon☆107Mar 14, 2023Updated 3 years ago