numirias / securityLinks
Some of my security stuff and vulnerabilities. Nothing advanced. More to come.
☆867Updated 6 years ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below
Sorting:
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆495Updated last year
- VirtualBox E1000 Guest-to-Host Escape☆1,412Updated 6 years ago
- GTRS - Google Translator Reverse Shell☆620Updated 2 weeks ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆677Updated 6 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆622Updated 5 years ago
- Some of my exploits.☆592Updated 4 years ago
- Interactive CTF Exploration Tool☆1,660Updated 4 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆719Updated 6 years ago
- $50 Million CTF from Hackerone - Writeup☆595Updated 6 years ago
- Proof of concept for CVE-2019-0708☆1,179Updated 3 years ago
- PoC for CVE-2019-5736☆653Updated 3 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆530Updated last year
- Bash post exploitation toolkit☆742Updated 2 years ago
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- Interactive shellcoding environment to easily craft shellcodes☆901Updated 4 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Updated 5 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆404Updated 5 years ago
- Proof-of-concept for the ZombieLoad attack☆817Updated 3 years ago
- Vulncode-DB project☆578Updated 3 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆459Updated 2 years ago
- Exploit for CVE-2019-11043☆1,831Updated 5 years ago
- List of awesome penetration testing resources, tools and other shiny things☆342Updated 7 years ago
- kernel privilege escalation enumeration and exploitation framework☆698Updated 7 years ago
- Vulnerability Labs for security analysis☆1,174Updated 4 years ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆338Updated last year
- A Pwn2Own exploit chain☆757Updated 6 years ago
- ☆232Updated 6 years ago
- DNS covert channel implant for Red Teams.☆734Updated 5 years ago
- A database of common, interesting or useful commands, in one handy referable form☆751Updated last year
- A wiki focusing on aggregating and documenting various SQL injection methods☆780Updated last year