infobyte / CVE-2023-21036Links
Detection and sanitization for Acropalypse Now - CVE-2023-21036
β81Updated 2 years ago
Alternatives and similar repositories for CVE-2023-21036
Users that are interested in CVE-2023-21036 are comparing it to the libraries listed below
Sorting:
- π€© Emoji shellcoding tools for RISC-V (32-bit and 64-bit)β175Updated 5 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrarβ¦β140Updated 3 months ago
- β207Updated last year
- β170Updated 3 years ago
- β85Updated 2 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86β¦β143Updated 3 years ago
- A toolbox for extracting RSA private keys from public keys.β189Updated 4 years ago
- Get rickrolled, right in your favourite NSA reverse engineering toolβ74Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injectionβ136Updated 8 months ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS serverβ123Updated 3 years ago
- β131Updated 2 years ago
- PNG-ZIP / JAR polyglot tool.β39Updated 3 weeks ago
- β137Updated last year
- Example of CVE-2024-24576 use case.β59Updated last year
- CVE-2023-4911 proof of conceptβ169Updated 2 years ago
- PoC for CVE-2022-24342: account takeover via CSRF in GitHub authenticationβ36Updated 3 years ago
- β65Updated 3 years ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094β144Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSONβ115Updated last year
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files anβ¦β25Updated 2 years ago
- Manjaro LPEβ34Updated 2 years ago
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.β82Updated 3 years ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.β135Updated last year
- β97Updated last year
- PoC_CVEsβ169Updated last month
- Binary Golf Grand Prixβ116Updated 2 years ago
- β12Updated 3 years ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.β99Updated 2 years ago
- CVE-2022-0847 DirtyPipe Exploit.β49Updated 3 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.β27Updated 3 years ago