fortra / CVE-2024-6768View external linksLinks
☆15Aug 12, 2024Updated last year
Alternatives and similar repositories for CVE-2024-6768
Users that are interested in CVE-2024-6768 are comparing it to the libraries listed below
Sorting:
- ☆16Jun 1, 2024Updated last year
- Windows Win32 Kernel Subsystem☆35Aug 23, 2025Updated 5 months ago
- ☆23Jan 27, 2026Updated 3 weeks ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 4 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Dec 22, 2024Updated last year
- A simple UEFI bootkit made by @NSG650 and me.☆26Dec 29, 2024Updated last year
- ☆180Jul 10, 2023Updated 2 years ago
- Proof-of-Concept for CVE-2024-26218☆55Apr 26, 2024Updated last year
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 4 months ago
- A collection of various exploits☆28Sep 17, 2024Updated last year
- Proof of concept & details for CVE-2025-21298☆195Jan 20, 2025Updated last year
- Utilities to handle Windows OS shutdown events☆30Feb 23, 2017Updated 8 years ago
- ☆82Apr 9, 2024Updated last year
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- ☆37Jan 4, 2026Updated last month
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- Target components for kAFL/Nyx Fuzzer☆34Jul 21, 2025Updated 6 months ago
- ip-keyloger☆10Jan 9, 2026Updated last month
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- Exploit POC for CVE-2024-36877☆48Aug 14, 2024Updated last year
- Android home screen widget to display todo list from the notion☆11Apr 3, 2022Updated 3 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- ☆11Apr 30, 2021Updated 4 years ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Source for challenges from bi0sCTF☆49Jun 15, 2025Updated 8 months ago
- An XNU kernel race condition bug☆47Jan 30, 2025Updated last year
- ☆57Dec 20, 2018Updated 7 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Apr 27, 2024Updated last year
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- Recover deleted Kakaotalk messages in Windows. Used Javascript and Frida.☆10Nov 20, 2021Updated 4 years ago
- A hacking panel based in Kali tools and more! Only with educational porpuses. The author is not responsable for any damage☆11Feb 7, 2022Updated 4 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- !exploitable Crash Analyzer - MSEC Debugger Extensions☆11Feb 16, 2021Updated 5 years ago