infobyte / CVE-2023-21036
Detection and sanitization for Acropalypse Now - CVE-2023-21036
☆80Updated last year
Alternatives and similar repositories for CVE-2023-21036:
Users that are interested in CVE-2023-21036 are comparing it to the libraries listed below
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆124Updated 5 months ago
- ☆11Updated last year
- ☆147Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- ☆230Updated 6 months ago
- CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent☆5Updated last year
- A small utility to translate NTDS.dit files to SQLite format.☆72Updated last year
- ☆63Updated last year
- Exploit for CVE-2022-30206☆75Updated 2 years ago
- ☆123Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year
- ☆46Updated 2 years ago
- My new C2 framework☆40Updated 2 years ago
- ☆204Updated 5 months ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆58Updated last year
- ☆68Updated 2 years ago
- ☆64Updated 2 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆151Updated last year
- LFI to RCE via phpinfo() assistance or via controlled log file☆62Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated 3 months ago
- ☆180Updated 6 months ago
- ☆148Updated last year
- CVE-2023-4911 proof of concept☆167Updated last year
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆17Updated last year
- APK Infrastructure Investigator☆62Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆37Updated 7 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆53Updated 11 months ago