edwardzpeng / presentationsLinks
☆268Updated last month
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- Chrome V8 n-day exploits that I've written.☆129Updated 2 years ago
- 容器安全漏洞的分析与复现☆158Updated last year
- RCE exploit for CVE-2023-3519☆224Updated last year
- attachments and (some) writeups/source code for RWCTF 6th☆113Updated last year
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆160Updated last year
- ☆134Updated 2 months ago
- CVE-2022-34918 netfilter nf_tables 本地提权 POC☆219Updated 2 years ago
- POC for CVE-2021-21974 VMWare ESXi RCE Exploit☆183Updated 3 years ago
- LPE exploit for CVE-2023-36802☆161Updated last year
- ☆125Updated 2 weeks ago
- CVE-2023-0386 analysis and Exp☆117Updated 2 years ago
- ☆180Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆219Updated last year
- VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)☆232Updated last year
- This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices☆194Updated 7 months ago
- 针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。☆202Updated 2 years ago
- Learnings about windows Internals☆93Updated last year
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆272Updated last year
- ☆124Updated 2 years ago
- ☆153Updated 2 years ago
- ☆214Updated last year
- ☆333Updated 11 months ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆135Updated last year
- PHP binary bugs advisory☆180Updated 2 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆117Updated 2 years ago
- ☆47Updated 2 years ago
- ☆195Updated 3 years ago
- Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC si…☆16Updated last month
- ☆171Updated last year
- WebLogic vulnerability exploration from beginner to expert.☆159Updated 2 years ago