may the poc with you
☆17May 6, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-2022-1040
Users that are interested in CVE-2022-1040 are comparing it to the libraries listed below
Sorting:
- ☆14Jan 7, 2022Updated 4 years ago
- CVE-2022-1040☆17Sep 25, 2022Updated 3 years ago
- Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239☆24Nov 1, 2020Updated 5 years ago
- Fortnite Internal☆21Apr 12, 2022Updated 3 years ago
- K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388☆54May 9, 2022Updated 3 years ago
- ☆34May 4, 2022Updated 3 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Jan 22, 2022Updated 4 years ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- ☆12Mar 26, 2020Updated 5 years ago
- Tomcat的Filter型免杀内存马,主要思路是Bypass各种检查手段☆10Nov 26, 2021Updated 4 years ago
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- Assignments for the cryptography engineering course☆12Dec 17, 2013Updated 12 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- Update playlist☆22Updated this week
- 🏍Fast Home Delivery App of Grocery ,Medicines , Vegetables ,etc during lockdown . Client can send Handwritten List Photo ,Chat with Shop…☆11Jun 27, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- add the charles ssl certificate to an android .apk file. Use that modified .apk to collect HTTP traffic.☆11Mar 21, 2023Updated 2 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50May 13, 2023Updated 2 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆45Mar 9, 2022Updated 3 years ago
- Test-driven data pipelines in pure Go☆11Jul 16, 2020Updated 5 years ago
- Caffe fork that supports SPP_net or faster R-CNN☆10Sep 29, 2016Updated 9 years ago
- Proving ground for changes to attohttpc☆12Jun 16, 2025Updated 8 months ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- Reusable slice of references☆11Dec 18, 2025Updated 2 months ago
- ☆11Jun 24, 2024Updated last year
- a small cmd line tool to align words in a sequence of lines in a smart way☆13Jan 15, 2026Updated last month
- ☆17Nov 28, 2022Updated 3 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- Demonstrate and showcasing how you can hide payload or secret message inside an image, audio, and PDF file and how an unethical person mi…☆12Jul 23, 2021Updated 4 years ago
- AMD Generic Encapsulated Software Architecture Platform Security Processor Configuration Block manipulation library☆16Dec 18, 2025Updated 2 months ago
- The repository contains Criminal IP Asset Search data in STIX 2.1 JSON format, enabling a quick understanding of threat information for s…☆11Jan 29, 2024Updated 2 years ago
- Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve☆15Jul 16, 2022Updated 3 years ago