Messing Apple devices on the network with CVE-2018-4407 (heap overflow in bad packet handling)
☆25Dec 4, 2018Updated 7 years ago
Alternatives and similar repositories for AppleDOS
Users that are interested in AppleDOS are comparing it to the libraries listed below
Sorting:
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- iOS 12.0 -> 12.1.2 _kernproc and _rootvnode offsets for 16K devices☆11Feb 15, 2019Updated 7 years ago
- eZpublish vulnerability scanner☆10Feb 20, 2020Updated 6 years ago
- A debugger in Python for Cisco c3560☆10Apr 24, 2018Updated 7 years ago
- A research done by Yaara Shriki and Roman Zaikin on Google maps April Fool Prank.☆15Oct 21, 2019Updated 6 years ago
- 打造一台翻墙路由器,ShadowSocks翻墙,OpenWrt路由器☆11Jan 17, 2016Updated 10 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Dec 12, 2018Updated 7 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)☆17Apr 29, 2021Updated 4 years ago
- 投诉太狠啊,换个地方自己下吧☆14Jun 13, 2016Updated 9 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- This project focuses on building a logic to calculate the distance to the next edge when a robot equipped with a 2D LIDAR sensor is place…☆20May 9, 2025Updated 9 months ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Oct 6, 2017Updated 8 years ago
- Fuzzer for PHP internal functions☆31Mar 9, 2012Updated 13 years ago
- Owasp Proxy☆30Oct 18, 2016Updated 9 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆45Sep 29, 2014Updated 11 years ago
- tools to encoding and decoding strings or cipher, may be can help in CTF☆24Mar 22, 2023Updated 2 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and saf…☆26Aug 14, 2020Updated 5 years ago
- this scanner try to scan some dbbak or ctf #源码泄露☆23Feb 5, 2018Updated 8 years ago
- Proof of calc for CVE-2019-6453☆50Jan 1, 2024Updated 2 years ago
- ☆25Mar 18, 2018Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- Stay on top of new domains! Bug bounty hunters can use this tool to receive Pushbullet notifications each time there is a new target subd…☆26Apr 14, 2018Updated 7 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Jul 9, 2019Updated 6 years ago
- ELF packer for i386☆32Dec 14, 2015Updated 10 years ago
- iOS 11.3.1 exploit☆48Dec 26, 2018Updated 7 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31May 25, 2016Updated 9 years ago
- 35C3 Junior CTF pwnables☆149Dec 30, 2018Updated 7 years ago
- Port of Google V8 JavaScript engine to z/OS. The Linux on Z port is maintained in the community: https://chromium.googlesource.com/v8/v8…☆43Feb 20, 2020Updated 6 years ago
- Tool for CVE-2018-16323☆82Jan 17, 2019Updated 7 years ago