eatscrayon / CVE-2022-3602-pocLinks
☆12Updated 2 years ago
Alternatives and similar repositories for CVE-2022-3602-poc
Users that are interested in CVE-2022-3602-poc are comparing it to the libraries listed below
Sorting:
- A PNG file-smuggling tool and library!☆25Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Keep it secret, keep it safe☆76Updated 5 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- ☆41Updated last year
- Find RSA primes in files☆20Updated 3 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated last year
- iTLB multihit PoC☆41Updated last year
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆28Updated 2 years ago
- ☆50Updated last year
- yxd - Yuu's heX Dumper☆89Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆20Updated 7 months ago
- ☆33Updated last year
- Some security by obscurity using port-jumping.☆14Updated 2 weeks ago
- WAMpage - A WebOS root LPE exploit chain (CVE-2022-23731)☆48Updated 3 years ago
- Remote Command executor☆77Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- ☆65Updated 3 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆116Updated 8 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 6 months ago
- Binary Golf Grand Prix☆112Updated last year
- 🥷 Soothing pastel theme for Binary Ninja☆26Updated 2 months ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆33Updated last year
- ☆27Updated 2 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated 7 months ago