eatscrayon / CVE-2022-3602-pocLinks
☆12Updated 3 years ago
Alternatives and similar repositories for CVE-2022-3602-poc
Users that are interested in CVE-2022-3602-poc are comparing it to the libraries listed below
Sorting:
- A PNG file-smuggling tool and library!☆26Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆35Updated 3 years ago
- Keep it secret, keep it safe☆79Updated 10 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated 11 months ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- BINARLY Research Tools and PoCs☆39Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 11 months ago
- Some security by obscurity using port-jumping.☆14Updated 3 months ago
- A way to use fonts to obfuscate text.☆48Updated 2 years ago
- Still point in moving world.☆49Updated 3 years ago
- ☆44Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆124Updated 2 weeks ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- One Bootloader to Load Them All - Research materials, Code , Etc.☆61Updated 3 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆13Updated 2 weeks ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- Encrypt your git repo...☆50Updated 3 years ago
- yet another hidden LKM hunter☆29Updated 2 months ago
- Manjaro LPE☆34Updated 2 years ago
- ☆33Updated 2 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- ☆52Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Remote Command executor☆81Updated 2 years ago