☆22Apr 23, 2017Updated 8 years ago
Alternatives and similar repositories for kernel-exploits
Users that are interested in kernel-exploits are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation auditing tool☆10Aug 24, 2017Updated 8 years ago
- Own collection dictionary☆14Apr 20, 2020Updated 5 years ago
- Analysis of different techniques to bypass Network Security Config with Frida☆33Dec 7, 2020Updated 5 years ago
- Minecraft mod that allow you to add an unlimited amount of your music as music discs.☆10Sep 6, 2025Updated 5 months ago
- host碰撞工具☆13May 22, 2023Updated 2 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Corny jokes for the terminal☆11Sep 12, 2024Updated last year
- Preparation for OSWE☆47Apr 19, 2020Updated 5 years ago
- ☆90Sep 7, 2018Updated 7 years ago
- Files accompanying helm security blog post☆12Aug 7, 2021Updated 4 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- Simple Lossy Compression Image Format for Embedded Platforms☆11Oct 31, 2025Updated 4 months ago
- Scripts aiding penetration testing of Splunk Enterprise systems☆10Jan 29, 2019Updated 7 years ago
- 一个红队知识仓库☆11Aug 1, 2023Updated 2 years ago
- Golang 判断 Web 页面相似度(XML/Json/HTML/RawText)☆10Feb 19, 2019Updated 7 years ago
- Vulnerable ASP.NET Core 2.0 App☆12Jul 12, 2023Updated 2 years ago
- 一款模仿bugscan的扫描器☆10Mar 22, 2018Updated 7 years ago
- A color scheme that mimics the standard scheme found in the EditPlus text editor☆11Oct 21, 2012Updated 13 years ago
- ☆11Oct 25, 2021Updated 4 years ago
- ☆11Apr 14, 2019Updated 6 years ago
- Find secrets on any machine from over 120 Different Signatures.☆48Aug 16, 2024Updated last year
- ☆14May 22, 2024Updated last year
- WebShell Collect☆11Jan 25, 2015Updated 11 years ago
- Information flow analysis tool for Android applications☆12Aug 16, 2021Updated 4 years ago
- Flexible guide to performing code review☆10Jul 17, 2017Updated 8 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- An TUI based elf analyzer☆10Apr 2, 2021Updated 4 years ago
- 安卓activity劫持演示demo,包含指定activity位于前台时的劫持和指定进程位于前台时的劫持☆15Dec 20, 2018Updated 7 years ago
- 公众号分享中的一些代码,poc, 及其他参考等☆12Apr 12, 2019Updated 6 years ago
- Gemini4IDA: Gemini for IDA disassembly and program analysis☆13Dec 29, 2023Updated 2 years ago
- 红队渗透:Harbor 公开镜像地址批量获取脚本☆11Mar 4, 2022Updated 3 years ago
- Examples from the Android SQlite and ContentProvider Book☆19Mar 28, 2012Updated 13 years ago
- 供测试的漏洞APP☆55May 2, 2019Updated 6 years ago
- Clone of the original project https://sourceforge.net/projects/sqsh/☆14Dec 8, 2023Updated 2 years ago
- AVRマイコンでUSB Power Deliveryをしたい☆12Jul 1, 2023Updated 2 years ago
- ☆18Dec 24, 2021Updated 4 years ago
- Jest preset for Fastly Compute@Edge☆11Mar 12, 2025Updated 11 months ago
- Just another repository for malware development☆13May 12, 2024Updated last year