This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.
☆147Nov 27, 2022Updated 3 years ago
Alternatives and similar repositories for vulnerability-write-ups
Users that are interested in vulnerability-write-ups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Leveraging patch diffing to discover new vulnerabilities☆140Oct 21, 2024Updated last year
- ☆282Aug 30, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- ☆152Feb 20, 2023Updated 3 years ago
- ☆187Nov 29, 2023Updated 2 years ago
- ☆38Dec 11, 2022Updated 3 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- ☆28Feb 6, 2024Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆47Dec 22, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 7 months ago
- ☆38Apr 7, 2023Updated 2 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Oct 21, 2024Updated last year
- ☆180Jul 10, 2023Updated 2 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- ☆44Aug 8, 2022Updated 3 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆129Aug 11, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- ☆12Aug 5, 2021Updated 4 years ago
- ☆136Dec 5, 2025Updated 3 months ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- ☆216Mar 29, 2024Updated last year
- ☆70Jul 6, 2023Updated 2 years ago
- ☆240Feb 26, 2023Updated 3 years ago
- ☆38Jan 6, 2025Updated last year
- ☆19Nov 26, 2024Updated last year
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆357Mar 16, 2026Updated last week
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,285Jan 29, 2026Updated last month
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated last year
- ☆71Oct 31, 2023Updated 2 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)☆231Nov 20, 2022Updated 3 years ago
- ☆16Jun 23, 2024Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon☆106Mar 14, 2023Updated 3 years ago
- Exploit for the CVE-2023-23397☆160Mar 15, 2023Updated 3 years ago