efchatz / easy-exploitsLinks
Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-41442, CVE-2021-41445, CVE-2021-41449, CVE-2021-41450, CVE-2021-41451, CVE-2021-41753, CVE-2021-41788, CVE-2021-46353, CVE-2022-41540, CVE-2022-41541)
☆17Updated 2 years ago
Alternatives and similar repositories for easy-exploits
Users that are interested in easy-exploits are comparing it to the libraries listed below
Sorting:
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated 2 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- ☆19Updated last year
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- Simple WebSocket fuzzer☆33Updated 2 years ago
- My malware analysis code snippets☆28Updated 2 years ago
- ☆17Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆21Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 7 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- ☆25Updated 3 years ago
- Custom Binary Ninja Themes☆12Updated last year
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated 2 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 8 months ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆17Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 4 months ago
- A collection of various exploits☆29Updated 11 months ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated last year