eatscrayon / CVE-2022-3602-pocLinks
☆12Updated 3 years ago
Alternatives and similar repositories for CVE-2022-3602-poc
Users that are interested in CVE-2022-3602-poc are comparing it to the libraries listed below
Sorting:
- A PNG file-smuggling tool and library!☆24Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆28Updated 3 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆121Updated 11 months ago
- BINARLY Research Tools and PoCs☆38Updated last year
- A stealthy ELF loader - no files, no execve, no RWX☆169Updated last year
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Keep it secret, keep it safe☆78Updated 8 months ago
- Still point in moving world.☆49Updated 3 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 10 months ago
- A way to use fonts to obfuscate text.☆46Updated 2 years ago
- yxd - Yuu's heX Dumper☆90Updated last year
- Binary Golf Grand Prix☆71Updated last week
- iTLB multihit PoC☆42Updated last year
- ☆51Updated last year
- Some security by obscurity using port-jumping.☆14Updated 2 months ago
- ☆40Updated last year
- ☆135Updated last year
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆16Updated 10 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 2 months ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- Binary Golf Grand Prix☆115Updated 2 years ago
- ☆90Updated 8 months ago
- Code injection from Linux kernel to a process☆24Updated 2 years ago
- Frida plugin for Binary Ninja☆18Updated 9 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago