infobyte / CVE-2023-21036Links
Detection and sanitization for Acropalypse Now - CVE-2023-21036
☆82Updated 2 years ago
Alternatives and similar repositories for CVE-2023-21036
Users that are interested in CVE-2023-21036 are comparing it to the libraries listed below
Sorting:
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆138Updated last month
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated 4 months ago
- ☆85Updated 2 years ago
- ☆207Updated last year
- 🏄♂️ Decode and analyze protobuf efficiently.☆134Updated last year
- ☆131Updated 2 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- ☆135Updated last year
- Simple attacks on AES-ECB☆22Updated 4 years ago
- ☆170Updated 3 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Updated 3 years ago
- PoC_CVEs☆168Updated 2 weeks ago
- Manjaro LPE☆34Updated 2 years ago
- Example of CVE-2024-24576 use case.☆59Updated last year
- A toolbox for extracting RSA private keys from public keys.☆189Updated 4 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆114Updated last year
- PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication☆36Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆142Updated 3 years ago
- ☆65Updated 2 years ago
- WallEscape vulnerability in util-linux☆52Updated last year
- ☆116Updated 2 years ago
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- Command-line & web tool for creating tweetable PNG-ZIP and PNG-JAR polyglot image files.☆37Updated last month
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆137Updated 6 months ago
- A list of public attacks on BitLocker☆398Updated 4 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆24Updated last year
- Scapy hands-on☆35Updated 2 years ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆53Updated 5 years ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆30Updated 3 years ago