eatscrayon / CVE-2022-3602-poc
☆12Updated 2 years ago
Alternatives and similar repositories for CVE-2022-3602-poc:
Users that are interested in CVE-2022-3602-poc are comparing it to the libraries listed below
- A PNG file-smuggling tool and library!☆24Updated last year
- Keep it secret, keep it safe☆77Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆28Updated 10 months ago
- A reconnaissance tool for ethical hackers written in RUST☆20Updated 9 months ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆16Updated last month
- A payload delivery system which embeds payloads in an executable's icon file!☆73Updated 11 months ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆51Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated 3 weeks ago
- yet another hidden LKM hunter☆17Updated last year
- DEFCON30 Talk Material, References and Extra Bits☆36Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Some security by obscurity using port-jumping.☆13Updated 4 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆41Updated last year
- ☆146Updated 9 months ago
- BINARLY Research Tools and PoCs☆35Updated 3 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆27Updated 2 years ago
- Linux rootkit for educational purposes☆29Updated 9 months ago
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated last year
- CVE-2021-4154 exploit☆65Updated 2 years ago
- ☆57Updated 10 months ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆29Updated 8 months ago
- ☆44Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆48Updated last year
- A multithreaded bruteforcer of argon2 hashes.☆34Updated last year
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆40Updated 7 months ago
- Custom exploits☆22Updated 9 months ago