Turning Your Computer Into a GPS Tracker With Apple Maps
☆18Feb 6, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2022-32883
Users that are interested in CVE-2022-32883 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Encode & decode any text into any custom alphabet, multibyte code points supported.☆10Jan 16, 2017Updated 9 years ago
- Programmatically extract saved passwords from Chromium based browsers.☆124Feb 26, 2022Updated 4 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- Turbodiff is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binarie…☆14Sep 23, 2021Updated 4 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Adobe Reader DC Information Leak Exploit☆23Oct 13, 2022Updated 3 years ago
- Apple PCC research☆17Mar 14, 2025Updated last year
- Code for our 2023 IEEE S&P Paper "The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web"☆15Dec 12, 2024Updated last year
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆13Mar 26, 2022Updated 4 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Find XS-Leaks in the browser by diffing DOM-Graphs in two states☆18Jan 20, 2025Updated last year
- Terribly incorrect and incomplete AOT compiler for mRuby. Source code for the LLVM Social Berlin #20☆10Aug 25, 2022Updated 3 years ago
- A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692☆35Nov 7, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 3 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 5 years ago
- `document.domain` intentionally weakens the only security boundary we have. Perhaps we can dump it?☆17Nov 3, 2023Updated 2 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 3 years ago
- Leakuidator+ helps users to protect themselves against cross-site leaks, a class of vulnerabilities derived from side-channels built into…☆11Jun 19, 2022Updated 3 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Dec 27, 2022Updated 3 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Triton based symbolic emulator☆16Oct 30, 2022Updated 3 years ago
- Extension to log postMessage()☆15Feb 17, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- PowerCamera Bukkit server plugin☆18Nov 24, 2025Updated 5 months ago
- MacOS C2 Framework☆85Sep 2, 2021Updated 4 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Jul 27, 2021Updated 4 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Skip youtube video sponsors (chrome extension)☆24Apr 28, 2021Updated 5 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆61Aug 4, 2022Updated 3 years ago
- Discover which process execute a hunted binary inside macOS☆29Dec 15, 2021Updated 4 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Apr 1, 2021Updated 5 years ago
- Proof of Concept: HTTP/2 CONTINUATION Flood☆10Apr 7, 2024Updated 2 years ago
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 4 months ago