Random CVEs
☆44Mar 22, 2026Updated 2 months ago
Alternatives and similar repositories for CVEs
Users that are interested in CVEs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- ☆26Jul 2, 2020Updated 5 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- RACF Database Parser☆12Apr 4, 2024Updated 2 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆406Jun 6, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆27Mar 3, 2022Updated 4 years ago
- Polish dicts for password cracking.☆10Dec 6, 2016Updated 9 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Windows internals and exploitation tricks☆116Mar 28, 2026Updated last month
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated last year
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Alleycat plugin by devttys0, ported to IDA 8☆10Jan 15, 2025Updated last year
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆28Jan 9, 2023Updated 3 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆117Dec 12, 2019Updated 6 years ago
- ☆15Jul 10, 2025Updated 10 months ago
- A collection of sample code used in some experiments with Sliver C2☆17Mar 28, 2023Updated 3 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Misc stuff from internet☆12Apr 13, 2026Updated last month
- ☆28Apr 4, 2023Updated 3 years ago
- A simple program to automate Microsoft OAuth device code phishing attacks.☆19Feb 15, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆63May 31, 2024Updated last year
- ☆49Jun 1, 2017Updated 8 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- A PoC of a privilege escalation vulnerability in the Realtek rtkio64 Windows driver.☆20Jul 6, 2020Updated 5 years ago
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆29Jan 4, 2024Updated 2 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆20Aug 8, 2019Updated 6 years ago
- A basic PE parser for 32-bit Windows executables.☆14May 24, 2017Updated 9 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A tool to modify SCCM remote control settings on the client machine, enabling remote control without permission prompts or notifications.…☆120Oct 20, 2024Updated last year
- a tiny code that performs kernel-mode read/write using CVE-2023-38817.☆18Mar 28, 2025Updated last year
- 🧿Join your two exe files☆13Jul 14, 2020Updated 5 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated 4 months ago
- ☆29Sep 5, 2025Updated 8 months ago
- Using SEH to bypass CFG☆29Mar 28, 2017Updated 9 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Mar 10, 2024Updated 2 years ago