rdomanski / Exploits_and_AdvisoriesView external linksLinks
Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.
☆114Feb 2, 2023Updated 3 years ago
Alternatives and similar repositories for Exploits_and_Advisories
Users that are interested in Exploits_and_Advisories are comparing it to the libraries listed below
Sorting:
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆852Apr 16, 2025Updated 9 months ago
- '>"><img src=x onerror=alert(1) /><b>asd</b>☆49Dec 20, 2021Updated 4 years ago
- ☆45Mar 2, 2021Updated 4 years ago
- ☆73Oct 31, 2023Updated 2 years ago
- ☆20Jan 24, 2022Updated 4 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆23Jan 17, 2024Updated 2 years ago
- Helper scripts to assist penetration testing and exploit development☆35Dec 11, 2024Updated last year
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 4 years ago
- A collection of utilities to simplify the creation of Burp Suite plugins☆22Dec 14, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- ☆342Jan 23, 2022Updated 4 years ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- ☆11Apr 10, 2018Updated 7 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- PoC for CVE-2021-43557☆22Nov 22, 2021Updated 4 years ago
- static sites for blog.orange.tw☆23Dec 31, 2025Updated last month
- An automated setup for compiling & fuzzing Apache httpd server☆51Jul 22, 2023Updated 2 years ago
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- ThunderCls's x64dbg Acid Lime Theme remixed☆12Jul 15, 2022Updated 3 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- CTFs and solutions for Linux binary exploitation.☆113Jun 9, 2024Updated last year
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆424Mar 20, 2022Updated 3 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆65May 21, 2023Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- My public talks☆14Oct 1, 2024Updated last year
- Disassemble V8 Ignition bytecode.☆12Jan 2, 2024Updated 2 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Apr 22, 2022Updated 3 years ago
- Exploit for CVE-2021-40449☆54Nov 7, 2021Updated 4 years ago
- Repository to store exploits created by Assetnotes Security Research team☆179Nov 7, 2023Updated 2 years ago
- A extension for collecting parameters☆25Oct 25, 2020Updated 5 years ago
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 4 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 8 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago