bluefrostsecurity / CVE-2023-2008View external linksLinks
Proof of concept code for CVE-2023-2008
☆40Jun 12, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-2008
Users that are interested in CVE-2023-2008 are comparing it to the libraries listed below
Sorting:
- ☆73Feb 28, 2024Updated last year
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Nov 23, 2023Updated 2 years ago
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- Research developed by Allele Security Intelligence.☆17Jul 21, 2025Updated 6 months ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆168Nov 12, 2023Updated 2 years ago
- ☆130Nov 12, 2024Updated last year
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆188Dec 25, 2020Updated 5 years ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- LPE exploit for CVE-2024-0582 (io_uring)☆101Mar 29, 2024Updated last year
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆51Jun 20, 2023Updated 2 years ago
- ☆70Jul 6, 2023Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- CVE-2023-32233: Linux内核中的安全漏洞☆370May 16, 2023Updated 2 years ago
- CVE-2022-34918 netfilter nf_tables 本地提权 POC☆219Sep 15, 2022Updated 3 years ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- ☆189Feb 8, 2025Updated last year
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆26Mar 3, 2023Updated 2 years ago
- ☆215Mar 29, 2024Updated last year
- Anti-Rootkit Tool for Windows☆12Mar 24, 2025Updated 10 months ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- Recursively extract urls from a web page for reconnaissance.☆12Jun 9, 2024Updated last year
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- Linux kernel privilege escalation techniques☆152Aug 9, 2024Updated last year
- Exploiting CVE-2016-2334 7zip HFS+ vulnerability☆10Nov 29, 2017Updated 8 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 6 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 9 months ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆156Sep 10, 2018Updated 7 years ago
- Collection of Rust repos useful for Red Teamers.☆34Sep 23, 2022Updated 3 years ago
- ☆34Jun 11, 2024Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆280May 27, 2023Updated 2 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆119Jan 9, 2023Updated 3 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago