jfrog / cve-2024-3094-toolsLinks
☆42Updated last year
Alternatives and similar repositories for cve-2024-3094-tools
Users that are interested in cve-2024-3094-tools are comparing it to the libraries listed below
Sorting:
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆143Updated last year
- Hides message with invisible Unicode characters☆94Updated 10 months ago
- ☆95Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- ☆82Updated last year
- ☆134Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 7 months ago
- Example of CVE-2024-24576 use case.☆57Updated last year
- Utility to find hidden Linux kernel modules☆144Updated 2 weeks ago
- ☆35Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆137Updated 2 years ago
- io_uring based rootkit☆218Updated 3 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 7 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆84Updated 5 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 9 months ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆61Updated 10 months ago
- A list of public attacks on BitLocker☆318Updated 5 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated this week
- CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent☆7Updated 2 years ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 2 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 6 months ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated last year
- ☆55Updated 9 months ago
- A tool to dump exposed .git repositories☆70Updated 2 months ago
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆136Updated 6 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- WallEscape vulnerability in util-linux☆51Updated last year
- Linpmem is a linux memory acquisition tool☆87Updated last month
- PoC for CVE-2024-48990☆98Updated 8 months ago