infobyte / CVE-2023-21036
Detection and sanitization for Acropalypse Now - CVE-2023-21036
☆82Updated 2 years ago
Alternatives and similar repositories for CVE-2023-21036
Users that are interested in CVE-2023-21036 are comparing it to the libraries listed below
Sorting:
- ☆147Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆126Updated 6 months ago
- Volatility Symbol Generator for Linux Kernels☆34Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- CVE-2023-4911 proof of concept☆168Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆141Updated last year
- ☆11Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆130Updated last year
- CVE-2021-4154 exploit☆66Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆114Updated this week
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆130Updated 2 years ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆47Updated 5 years ago
- Cisco ASA Software and ASDM Security Research☆85Updated 2 years ago
- ☆42Updated 2 weeks ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆73Updated last year
- Exploit for CVE-2022-30206☆75Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆18Updated last year
- Volatility, on Docker 🐳☆34Updated last month
- ☆63Updated last year
- ☆214Updated last year
- ☆203Updated 6 months ago
- ☆133Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆40Updated last month
- ☆184Updated last week
- ☆68Updated 2 years ago