hupe1980 / gopwn
Golang CTF framework and exploit development module
☆26Updated 3 years ago
Related projects: ⓘ
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)☆69Updated 3 months ago
- ☆66Updated this week
- Research analysis☆55Updated 2 months ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆118Updated last year
- pwntools for go!☆20Updated 5 years ago
- VM Escape for Parallels Desktop <18.1.1☆168Updated 6 months ago
- ☆85Updated last year
- DSL engine☆69Updated this week
- CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸☆30Updated 2 years ago
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆31Updated last year
- ☆151Updated last year
- 针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。☆204Updated last year
- ☆61Updated 11 months ago
- POC of CVE-2023-35086 only DoS☆44Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆55Updated 5 months ago
- CTF writeups from GatorSheavesMutably (https://ctftime.org/team/109518) and More Smoked Leet Chicken (https://ctftime.org/team/1005)☆19Updated 8 months ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆44Updated 2 months ago
- ☆71Updated 6 months ago
- CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation☆60Updated 2 years ago
- Collect public CTF source code repo☆46Updated 2 years ago
- ☆46Updated 2 years ago
- A Pwn2Own SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆83Updated 2 months ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆32Updated last year
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆29Updated 3 months ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆156Updated 10 months ago
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆42Updated 2 years ago
- ☆17Updated last year
- Automated tool implementing Hash Length Extension Attack in MD4,MD5,SHA1,SHA256,SHA512 along with an example☆12Updated 10 months ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Updated last year