jeffssh / exploits
Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation
☆43Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for exploits
- CVE-2022-22629 Proof of Concept☆51Updated 2 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆52Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆59Updated last year
- ☆27Updated 2 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated 9 months ago
- Leveraging patch diffing to discover new vulnerabilities☆108Updated last month
- Dynamic-Static binary instrumentation framework on top of GDB☆49Updated last year
- ☆30Updated 2 years ago
- ☆71Updated 2 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆40Updated 3 years ago
- ☆31Updated 5 months ago
- ☆71Updated last year
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆43Updated 3 years ago
- ☆69Updated 2 years ago
- ☆55Updated 2 years ago
- Google Chrome Use After Free☆55Updated 2 years ago
- WebGL fuzzer☆38Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆62Updated 7 months ago
- ☆25Updated 9 months ago
- Resources and writeups for studying & practicing iOS security☆51Updated 3 years ago
- Collection of materials relating to FORCEDENTRY☆92Updated 7 months ago
- Some presentations I did in the past☆64Updated last year
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆44Updated 4 months ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆16Updated last year
- ☆74Updated 2 months ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆91Updated last month
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆122Updated 2 years ago
- macOS Security Research☆108Updated 8 months ago
- Shielder's public proof of concepts collection☆27Updated 2 months ago
- ☆59Updated 9 months ago