breachnix / dirty-pipe-pocView external linksLinks
CVE-2022-0847 POC
☆15Mar 14, 2022Updated 3 years ago
Alternatives and similar repositories for dirty-pipe-poc
Users that are interested in dirty-pipe-poc are comparing it to the libraries listed below
Sorting:
- Generative web directory fuzzer,crawling and subdomain checker based on chatgpt☆16May 15, 2024Updated last year
- NEVER EVER DISABLE SELINUX!!!☆25Jan 30, 2024Updated 2 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Apr 17, 2020Updated 5 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Hackable, local, ai-enabled notes app☆17Jan 25, 2026Updated 3 weeks ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- ☆10Jan 11, 2024Updated 2 years ago
- General control of Android installations.☆15Jun 4, 2025Updated 8 months ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆10Dec 8, 2022Updated 3 years ago
- ERPNext / Frappe Framework MariaDB configuration file☆16Jun 22, 2021Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Native Twitch client for MacOS, build with SwiftUI.☆11Mar 1, 2023Updated 2 years ago
- repo about binary exploitation☆12Dec 5, 2023Updated 2 years ago
- Simple Crud php mysql bootstrap 5 utilizando xampp☆14Aug 25, 2021Updated 4 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- A customized version of Ella used in the paper `An Empirical Study of Android Test Generation Tools in Industrial Cases`.☆10Aug 19, 2020Updated 5 years ago
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago
- ☆12Mar 2, 2023Updated 2 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 11 years ago
- PoC for hiding data within $MFT☆12Aug 14, 2014Updated 11 years ago
- Python常用代码段☆11Sep 8, 2021Updated 4 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Scoring engine for cyber defense competitions☆10Jan 30, 2022Updated 4 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 weeks ago
- Simple, reliable, persistent, undetectable Android reverse shell payload, compatible with Android 8, 9, 10, 11, 12 and 13☆12Dec 30, 2023Updated 2 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- A gemini server written in rust.☆10Sep 28, 2025Updated 4 months ago
- Python script to get Samba Server Version☆11May 8, 2018Updated 7 years ago
- Find out cryptocurrency arbitrage opportunities across exchanges. (No Fiat withdrawal involved)☆11Jan 30, 2018Updated 8 years ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- 🔥🔥🔥 AI security automation platform. Build visual workflows, deploy autonomous agents, and automate threat detection and response. 80+…☆27Updated this week