infobyte / CVE-2023-21036Links
Detection and sanitization for Acropalypse Now - CVE-2023-21036
β82Updated 2 years ago
Alternatives and similar repositories for CVE-2023-21036
Users that are interested in CVE-2023-21036 are comparing it to the libraries listed below
Sorting:
- π€© Emoji shellcoding tools for RISC-V (32-bit and 64-bit)β176Updated 2 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrarβ¦β135Updated 2 weeks ago
- β84Updated 2 years ago
- β206Updated last year
- β169Updated 3 years ago
- CVE-2023-4911 proof of conceptβ169Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injectionβ133Updated 5 months ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files anβ¦β22Updated last year
- A toolbox for extracting RSA private keys from public keys.β188Updated 4 years ago
- β135Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86β¦β139Updated 3 years ago
- CVE-2022-0847 DirtyPipe Exploit.β49Updated 3 years ago
- β128Updated 2 years ago
- PoC_CVEsβ163Updated last week
- WallEscape vulnerability in util-linuxβ52Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094β144Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering toolβ77Updated 2 years ago
- β64Updated 2 years ago
- β68Updated 3 years ago
- πββοΈ Decode and analyze protobuf efficiently.β132Updated last year
- Command-line & web tool for creating tweetable PNG-ZIP and PNG-JAR polyglot image files.β37Updated 2 weeks ago
- Scapy hands-onβ34Updated last year
- Information for CVE-2024-3094β53Updated last year
- An archive of descrypt hashes for common non-personal passwordsβ39Updated 4 months ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS serverβ123Updated 3 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.β26Updated 3 years ago
- Still point in moving world.β49Updated 3 years ago
- PoC for CVE-2024-48990β100Updated 11 months ago
- Binary Golf Grand Prixβ115Updated 2 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSONβ113Updated last year