Cryptanalysis of the DAO exploit & Multi-Stage Attack
☆19Apr 3, 2024Updated last year
Alternatives and similar repositories for Dao-Exploit
Users that are interested in Dao-Exploit are comparing it to the libraries listed below
Sorting:
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- Some of my flag protected writeups☆11Apr 13, 2020Updated 5 years ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆23Sep 13, 2022Updated 3 years ago
- ☆71Oct 31, 2023Updated 2 years ago
- Oracle WebLogic CVE-2022-21371☆19Aug 31, 2022Updated 3 years ago
- Blue Team Powershell Script☆18Nov 22, 2021Updated 4 years ago
- A mempool listener for contract specific transactions.☆13Aug 19, 2024Updated last year
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- POC of CVE-2023-35086 only DoS☆44Jul 25, 2023Updated 2 years ago
- A brute force, heuristics, stadistical and down the hill solution to solve enigma msg by KPA. ( mirror from https://code.haibane.org/cap…☆13Oct 2, 2021Updated 4 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- zimbra "zmslapd" lpe☆23Oct 27, 2021Updated 4 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- Jasmin ransomware web panel path traversal PoC☆21Apr 9, 2024Updated last year
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- to show pocs found☆10Jul 16, 2025Updated 8 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆132Apr 25, 2022Updated 3 years ago
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Aug 20, 2023Updated 2 years ago
- A list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of hosting and mana…☆14Jan 3, 2020Updated 6 years ago
- A type-safe way to emulate tail-call optimization with trampolines☆20Oct 20, 2023Updated 2 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Aug 4, 2022Updated 3 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution☆83Feb 6, 2024Updated 2 years ago
- My public findings/reports from decentralized audits, select bug bounty programs and engagements☆13Mar 1, 2026Updated 2 weeks ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- privilege escalation POCs built in Rust.☆19Jun 30, 2022Updated 3 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Dec 5, 2023Updated 2 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- An XNU kernel race condition bug☆47Jan 30, 2025Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Jan 24, 2024Updated 2 years ago
- Daily alert when a new domain name is registered and contains your keywords☆119Oct 23, 2023Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- ☆116Sep 5, 2023Updated 2 years ago
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆15Dec 18, 2023Updated 2 years ago