infobyte / CVE-2023-21036
Detection and sanitization for Acropalypse Now - CVE-2023-21036
☆80Updated last year
Alternatives and similar repositories for CVE-2023-21036:
Users that are interested in CVE-2023-21036 are comparing it to the libraries listed below
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆124Updated 4 months ago
- ☆11Updated last year
- CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent☆5Updated last year
- ☆146Updated 11 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆173Updated last year
- CVE-2021-4154 exploit☆66Updated 2 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year
- PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication☆36Updated 2 years ago
- Manjaro LPE☆34Updated last year
- A small utility to translate NTDS.dit files to SQLite format.☆71Updated last year
- ☆63Updated last year
- Volatility, on Docker 🐳☆33Updated 8 months ago
- Exploit for CVE-2022-30206☆75Updated 2 years ago
- WallEscape vulnerability in util-linux☆50Updated 11 months ago
- ☆80Updated last year
- Upload files done during my research.☆134Updated 2 months ago
- Binary Golf Grand Prix☆111Updated last year
- ☆231Updated 5 months ago
- ☆12Updated 2 years ago
- Memory mapping profiles for forensic analysis using volatility 3☆26Updated 2 years ago
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆53Updated 10 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last week
- CVE-2023-20198 Checkscript☆17Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated 2 months ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆17Updated last year
- ☆178Updated 6 months ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated last year
- A PNG file-smuggling tool and library!☆24Updated last year