Various exploits for SerenityOS
☆17Oct 29, 2021Updated 4 years ago
Alternatives and similar repositories for serenity-exploits
Users that are interested in serenity-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- Lazily wraps various Linux system auditing tools☆20Updated this week
- A simple remote scanner for Liferay Portal☆21Apr 6, 2025Updated 11 months ago
- ☆29Feb 20, 2024Updated 2 years ago
- DOOM port for Serenity☆32Aug 1, 2023Updated 2 years ago
- Improved version of pintool☆17Jul 24, 2016Updated 9 years ago
- A tool to do basic fingerprinting across a large number of hosts☆11Oct 20, 2020Updated 5 years ago
- Tracks cross references and allows fast viewing of pseudocode between references☆13Mar 10, 2025Updated last year
- A docker environment which could run and debug multiarch program, such as mips, arm☆18Nov 25, 2020Updated 5 years ago
- Custom Metasploit logos☆54Nov 13, 2021Updated 4 years ago
- ☆13Jul 27, 2020Updated 5 years ago
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- Ghidra data type archive for Windows driver analysis☆30Oct 10, 2024Updated last year
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- Generate PPT via a simple summary☆13Oct 28, 2018Updated 7 years ago
- A Trace Explorer for Reverse Engineers☆25Nov 5, 2025Updated 4 months ago
- https://github.com/nongiach/arm_now rootfs and kernel☆11Sep 16, 2022Updated 3 years ago
- ☆41May 7, 2024Updated last year
- Attempt to connect to and dump all tables within a ServiceNow instance.☆20Jul 4, 2023Updated 2 years ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- Set of tools to analyze Windows sandboxes for exposed attack surface. (Maintained V1 branch).☆18Nov 2, 2024Updated last year
- Important notes for oswe exam prepration. Challenges faces during oswe exam prepration.☆17Jan 14, 2020Updated 6 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- A collection of utilities to simplify the creation of Burp Suite plugins☆22Dec 14, 2023Updated 2 years ago
- AFL with QEMU 3.1.0 + optimizations (thread safe this time) from https://github.com/abiondo/afl☆10Mar 12, 2019Updated 7 years ago
- iCloud-Bypass-MEID-Signal-Apple☆11Jul 16, 2024Updated last year
- tetctf2020_amf_writeups☆23Jan 3, 2021Updated 5 years ago
- ☆12Aug 31, 2022Updated 3 years ago
- DEFCON 2018 Qualification writeups☆13May 14, 2018Updated 7 years ago
- ☆40Feb 3, 2026Updated last month
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- A C++ wrapper for icedx86 decoder☆48Jul 28, 2025Updated 7 months ago