robocoder / phpvhLinks
PHP Vulnerability Hunter (fork)
☆12Updated 10 years ago
Alternatives and similar repositories for phpvh
Users that are interested in phpvh are comparing it to the libraries listed below
Sorting:
- CVE-2019-12949☆26Updated 6 years ago
- ☆28Updated 4 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- ☆17Updated 7 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- ☆13Updated 5 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- Links or additional data to some researches☆14Updated 6 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆14Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- ☆28Updated 8 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆37Updated 6 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 5 years ago
- My Shellcode Archive☆28Updated 8 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- PoC ActiveX SVG Document Execution☆21Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Create COM Objects backed by Scripts, not DLLs☆9Updated 8 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 6 years ago
- ☆17Updated 5 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- ☆14Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- APT34/OILRIG leak☆12Updated 6 years ago
- My manual analysis of malware families☆13Updated 8 years ago