cloudsec / exploitLinks
Some kernel exploit i wrote
☆76Updated 10 years ago
Alternatives and similar repositories for exploit
Users that are interested in exploit are comparing it to the libraries listed below
Sorting:
- ☆79Updated 9 years ago
- ☆51Updated 8 years ago
- ☆85Updated last year
- A Swiss Army Knife for Windows Exploit Development.☆40Updated 9 years ago
- ☆89Updated 4 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 8 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 9 years ago
- Linux local root exploit for CVE-2014-0038☆194Updated 11 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆153Updated 8 years ago
- ☆19Updated 11 years ago
- my public code☆166Updated 8 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Updated 2 years ago
- fuzz☆125Updated 9 years ago
- Shell script for testing the SSL/TLS Protocols☆33Updated 7 years ago
- A Browser Fuzzer for Vulnerbilities☆65Updated 10 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- Various Scripts for Mobile Pen-testing with Frida☆76Updated 9 years ago
- ☆112Updated 8 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆49Updated 12 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Fork from http://redmine.poppopret.org/projects/suterusu. An LKM rootkit targeting Linux 2.6/3.x on x86 and ARM. Supports privilege esca…☆33Updated 12 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- Unix remote login tool, rootkit shell tool☆34Updated 10 years ago
- Exploit collection for NT privilege escalation☆65Updated 9 years ago
- Some source code snippets In my development.☆27Updated 3 years ago
- *NIX X11 Keylogger☆75Updated 5 years ago
- ☆74Updated 2 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Updated 7 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago