numirias / securityLinks
Some of my security stuff and vulnerabilities. Nothing advanced. More to come.
☆869Updated 6 years ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below
Sorting:
- VirtualBox E1000 Guest-to-Host Escape☆1,415Updated 6 years ago
- GTRS - Google Translator Reverse Shell☆619Updated 11 months ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- Interactive CTF Exploration Tool☆1,661Updated 4 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆678Updated 6 years ago
- Interactive shellcoding environment to easily craft shellcodes☆902Updated 4 years ago
- Some of my exploits.☆590Updated 4 years ago
- Proof of concept for CVE-2019-0708☆1,181Updated 3 years ago
- Proof-of-concept for the ZombieLoad attack☆817Updated 3 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆626Updated 5 years ago
- $50 Million CTF from Hackerone - Writeup☆595Updated 6 years ago
- PoC for CVE-2019-5736☆653Updated 3 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆720Updated 6 years ago
- kernel privilege escalation enumeration and exploitation framework☆698Updated 7 years ago
- Exploit written in Python for CVE-2018-15473 with threading and export formats☆529Updated last year
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆404Updated 4 years ago
- Bash post exploitation toolkit☆741Updated 2 years ago
- Vulncode-DB project☆581Updated 3 years ago
- Exploit for CVE-2019-11043☆1,830Updated 5 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆460Updated 2 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆507Updated 3 years ago
- A database of common, interesting or useful commands, in one handy referable form☆751Updated last year
- Pop shells like a master.☆1,473Updated 6 years ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆743Updated last year
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Updated 5 years ago
- 🔪Browser logic vulnerabilities☆694Updated 4 years ago
- List of awesome penetration testing resources, tools and other shiny things☆343Updated 7 years ago
- A Pwn2Own exploit chain☆759Updated 6 years ago