infobyte / CVE-2023-21036Links
Detection and sanitization for Acropalypse Now - CVE-2023-21036
β82Updated 2 years ago
Alternatives and similar repositories for CVE-2023-21036
Users that are interested in CVE-2023-21036 are comparing it to the libraries listed below
Sorting:
- π€© Emoji shellcoding tools for RISC-V (32-bit and 64-bit)β176Updated 3 weeks ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrarβ¦β131Updated 10 months ago
- β205Updated 10 months ago
- β125Updated last year
- β82Updated 2 years ago
- β134Updated last year
- WallEscape vulnerability in util-linuxβ51Updated last year
- πββοΈ Decode and analyze protobuf efficiently.β126Updated 10 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86β¦β137Updated 2 years ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.β29Updated 2 years ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094β144Updated last year
- CVE-2023-4911 proof of conceptβ168Updated last year
- β63Updated 2 years ago
- β233Updated 11 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USAβ39Updated 2 years ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enoughβ85Updated 4 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files anβ¦β21Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering toolβ77Updated 2 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSONβ113Updated last year
- β95Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injectionβ120Updated 3 months ago
- β169Updated 2 years ago
- Example of CVE-2024-24576 use case.β57Updated last year
- A list of public attacks on BitLockerβ319Updated 3 weeks ago
- Embed a ZIP or JAR file within a PNG image to create a tweetable and "executable" PNG-ZIP/JAR polyglot.β36Updated last week
- Still point in moving world.β51Updated 2 years ago
- Binary Golf Grand Prixβ113Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.β26Updated 3 years ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.β135Updated last year
- PoC_CVEsβ163Updated last month