h4ppy7ree / kernel-exploitsLinks
☆22Updated 8 years ago
Alternatives and similar repositories for kernel-exploits
Users that are interested in kernel-exploits are comparing it to the libraries listed below
Sorting:
- WAF Bypass Cheatsheet☆213Updated 8 years ago
- WebLogic wls9-async反序列化远程命令执行漏洞☆242Updated 6 years ago
- Linux privilege escalation auditing tool☆11Updated 8 years ago
- wooyun public information backup☆121Updated 8 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Updated 6 years ago
- java unserialize vul for weblogic exploit☆175Updated 7 years ago
- Happy Hunting☆138Updated 6 years ago
- A collection of penetration testing related sites☆286Updated 4 years ago
- XSS_Filter_Evasion_Cheat_Sheet 中文版☆78Updated 11 years ago
- Exploit management framework☆152Updated 2 years ago
- 解密好的AWVS10.5 data/script/目录下的脚本☆267Updated 7 years ago
- Web App Monitor☆228Updated 7 years ago
- ☆90Updated 7 years ago
- QAQ Just study unserialize vulnerabilities in Java :)☆196Updated 7 years ago
- CVE-2018-3245-PoC☆168Updated 4 years ago
- Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.☆99Updated 10 years ago
- Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!☆297Updated 6 years ago
- Weblogic Upload Vuln(Need username password)-CVE-2019-2618☆173Updated 6 years ago
- Apache Tomcat Remote Code Execution on Windows☆187Updated 5 years ago
- CMS识别 python gevent实现☆213Updated 6 years ago
- i`m a cat ~ find fish☆92Updated 4 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Updated 8 years ago
- 第一届爱奇艺安全沙龙 议题PPT分享☆83Updated 6 years ago
- A plug-in of sublime 2/3 which is able to find PHP vulnerabilities☆58Updated 7 years ago
- A domain searcher named GoogleSSLdomainFinder - 基于谷歌SSL透明 证书的子域名查询工具☆182Updated 7 years ago
- Java-Web-Security - Sichere Webanwendungen mit Java entwickeln☆220Updated this week
- ☆184Updated 2 years ago
- ☆136Updated 4 years ago
- A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.☆173Updated 9 years ago
- POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/☆268Updated 6 years ago