☆189Oct 25, 2017Updated 8 years ago
Alternatives and similar repositories for CVE
Users that are interested in CVE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some kernel exploits☆145Nov 7, 2017Updated 8 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Feb 2, 2018Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆308Jan 12, 2023Updated 3 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆49Jun 27, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 7 years ago
- My proof-of-concept exploits for the Linux kernel☆1,576Sep 11, 2025Updated 8 months ago
- ☆113Jun 5, 2017Updated 8 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Sep 23, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆119Nov 6, 2024Updated last year
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆201Nov 30, 2017Updated 8 years ago
- poc or exp of android vulnerability☆406Dec 30, 2017Updated 8 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- ☆164May 18, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- some vul☆793Apr 25, 2025Updated last year
- ☆32Nov 15, 2017Updated 8 years ago
- kernel privilege escalation enumeration and exploitation framework☆704Aug 2, 2018Updated 7 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- A list of my CVE's with POCs☆682Dec 15, 2020Updated 5 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- Fuzzer for Linux Kernel Drivers☆384Apr 30, 2022Updated 4 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- exploit code for a bpf heap overflow vulnerability☆27Sep 3, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- macOS Kernel Fuzzer☆260Oct 23, 2017Updated 8 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Mar 20, 2021Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 10 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆312Sep 10, 2018Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- OpenSource My ImageMagick Fuzzer ..☆296Jul 26, 2017Updated 8 years ago
- Exploit primitives for PowerShell☆435Mar 25, 2018Updated 8 years ago
- Cross Platform Kernel Fuzzer Framework☆455Oct 11, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- jemalloc heap exploitation framework☆465Nov 29, 2021Updated 4 years ago
- A linux system call fuzzer using TriforceAFL☆178Feb 28, 2024Updated 2 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆120Apr 19, 2018Updated 8 years ago
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆181Jul 26, 2017Updated 8 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- Arbitrary code execution with kernel privileges using CVE-2018-8897.☆420May 18, 2018Updated 8 years ago