numirias / security
Some of my security stuff and vulnerabilities. Nothing advanced. More to come.
☆866Updated 5 years ago
Alternatives and similar repositories for security:
Users that are interested in security are comparing it to the libraries listed below
- Proof of concept for CVE-2019-0708☆1,182Updated 3 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,406Updated 6 years ago
- Avast JavaScript Interactive Shell☆670Updated 5 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- Some of my exploits.☆577Updated 4 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆712Updated 5 years ago
- 🔪Browser logic vulnerabilities☆690Updated 4 years ago
- Vulncode-DB project☆577Updated 3 years ago
- Interactive shellcoding environment to easily craft shellcodes☆894Updated 4 years ago
- DNS covert channel implant for Red Teams.☆731Updated 5 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 6 months ago
- PoC for CVE-2019-5736☆647Updated 3 years ago
- My proof-of-concept exploits for the Linux kernel☆1,465Updated 3 years ago
- Proof-of-concept for the ZombieLoad attack☆813Updated 3 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆622Updated 4 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆745Updated last year
- Vulnerability Labs for security analysis☆1,167Updated 4 years ago
- Interactive CTF Exploration Tool☆1,656Updated 3 years ago
- $50 Million CTF from Hackerone - Writeup☆589Updated 6 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆667Updated 5 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆401Updated 4 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆522Updated 8 months ago
- Exploit for CVE-2019-11043☆1,809Updated 5 years ago
- A Pwn2Own exploit chain☆761Updated 6 years ago
- List of awesome penetration testing resources, tools and other shiny things☆341Updated 6 years ago
- Linux Exploit Suggester; based on operating system release number☆1,786Updated 10 years ago
- Pop shells like a master.☆1,455Updated 6 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆454Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆493Updated 3 years ago