Random CVEs
☆42Mar 22, 2026Updated 3 weeks ago
Alternatives and similar repositories for CVEs
Users that are interested in CVEs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- ☆25Jul 2, 2020Updated 5 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- RACF Database Parser☆12Apr 4, 2024Updated 2 years ago
- Polish dicts for password cracking.☆10Dec 6, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Windows internals and exploitation tricks☆113Mar 28, 2026Updated 2 weeks ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆405Jun 6, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆118Dec 12, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆15Jul 10, 2025Updated 9 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 3 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 5 months ago
- ☆28Apr 4, 2023Updated 3 years ago
- A simple program to automate Microsoft OAuth device code phishing attacks.☆19Feb 15, 2024Updated 2 years ago
- ☆50Jun 1, 2017Updated 8 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A PoC of a privilege escalation vulnerability in the Realtek rtkio64 Windows driver.☆20Jul 6, 2020Updated 5 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆20Aug 8, 2019Updated 6 years ago
- A basic PE parser for 32-bit Windows executables.☆14May 24, 2017Updated 8 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆119Oct 20, 2024Updated last year
- a tiny code that performs kernel-mode read/write using CVE-2023-38817.☆18Mar 28, 2025Updated last year
- 🧿Join your two exe files☆13Jul 14, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆30Sep 5, 2025Updated 7 months ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 9 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Mar 10, 2024Updated 2 years ago
- ☆31Dec 1, 2022Updated 3 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- mitigation script by disabling ipv6 of all interfaces☆14Aug 15, 2024Updated last year
- a BOF implementation of various registry persistence methods☆96Nov 11, 2025Updated 5 months ago