mmiszczyk / CVE-2024-33352
BlueStacks privilege escalation through VM backdooring
☆20Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2024-33352
- Detect code obfuscation through text classification in the detection process.☆44Updated 9 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆19Updated last month
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆26Updated 3 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆29Updated 2 months ago
- Full exploit chain for Faronics-DeepFreeze-8☆3Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated 11 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆62Updated 3 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 6 months ago
- ☆13Updated last year
- Keycloak admin API allows low privilege users to use administrative functions☆23Updated last month
- aiohttp LFI (CVE-2024-23334)☆22Updated 8 months ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆30Updated last year
- Ansible build for Afl++ Frida-Mode☆22Updated 5 months ago
- hiding in plain sight: part 2☆46Updated 4 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆20Updated 7 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆27Updated 4 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆19Updated 5 months ago
- ☆25Updated last year
- ☆14Updated last month
- Repo for all my exploits/PoCs☆27Updated 2 months ago
- This contains notes and code for my Troopers23 Beyond Java talk☆22Updated last year
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆63Updated 8 months ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆13Updated last month
- Auto exploitation tool for CVE-2024-24401.☆31Updated 2 months ago
- CVE-2023-6875 PoC☆24Updated 10 months ago
- my own 2fa bypass methodolgy☆22Updated last year