Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!
☆47Apr 5, 2025Updated 11 months ago
Alternatives and similar repositories for vault_range_poc
Users that are interested in vault_range_poc are comparing it to the libraries listed below
Sorting:
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 2 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- a new cfi mechanism☆33Sep 23, 2021Updated 4 years ago
- Automated recovery of Linux kernel build configurations☆25Jan 14, 2022Updated 4 years ago
- A collection of bypasses and exploits for eBPF-based cloud security.☆26Jan 12, 2024Updated 2 years ago
- ☆103Mar 8, 2022Updated 3 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 6 months ago
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- Kamus Besar Bahasa Indonesia☆11Aug 26, 2025Updated 6 months ago
- Multiple tor circuit with golang☆13Jun 25, 2022Updated 3 years ago
- Monitor and prevent unexpected behavior of Java programs.☆14Jul 6, 2021Updated 4 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- The Official Repository for BanditHijo (R)-Chive v1☆13Jan 14, 2026Updated last month
- Bypass EDR(Endpoint Detection and Response) environment to write Behinder jsp webshell onto webserver☆13Dec 27, 2023Updated 2 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- Malware that TeamTNT found and removed.☆14Nov 27, 2020Updated 5 years ago
- ☆17Nov 28, 2021Updated 4 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- ☆14Sep 26, 2021Updated 4 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Jul 31, 2015Updated 10 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Mar 13, 2022Updated 3 years ago
- CVE-2022-0185☆378Apr 25, 2022Updated 3 years ago
- ☆15Dec 16, 2025Updated 2 months ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- 针对于Jenkins控制台用户的暴力破解工具☆33Jan 12, 2021Updated 5 years ago
- ☆16Jun 23, 2024Updated last year
- ☆15Nov 4, 2020Updated 5 years ago
- Powershell and python utilties for Entra Connect☆28Jun 5, 2025Updated 9 months ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Aug 3, 2021Updated 4 years ago
- ☆16Jun 9, 2023Updated 2 years ago
- QEMU VM with generic KVM extensions for symbolic execution☆26Updated this week
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Apr 8, 2022Updated 3 years ago
- This repository contains exploit and reverse-engineering source code regarding the Spectre-BHB/Branch History Injection vulnerability☆121Apr 12, 2022Updated 3 years ago
- QEMU escape code☆65Jun 6, 2021Updated 4 years ago
- A userland USB gadget driver for macOS 12 which emulates a HID keyboard☆20May 4, 2022Updated 3 years ago