ruycr4ft / CVE-2023-4911Links
CVE-2023-4911
☆16Updated 2 years ago
Alternatives and similar repositories for CVE-2023-4911
Users that are interested in CVE-2023-4911 are comparing it to the libraries listed below
Sorting:
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆221Updated last year
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆165Updated last year
- CVE-2023-4911 proof of concept☆168Updated 2 years ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- MCP for Pwn☆129Updated last month
- Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!☆151Updated 4 months ago
- ☆213Updated last year
- ☆36Updated last year
- Source code for the DEF CON 31 CTF Qualifiers.☆124Updated 2 years ago
- Let's get familiar with Windows pwn 😎☆48Updated 5 years ago
- out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability☆141Updated last year
- ☆172Updated 2 years ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- Automated solver of classic CTF pwn challenges, with flexibility in mind.☆64Updated 3 years ago
- public archive for corCTF 2022☆35Updated 3 years ago
- CVE-2023-32233: Linux内核中的安全漏洞☆372Updated 2 years ago
- ☆70Updated 2 years ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated 10 months ago
- ☆129Updated 11 months ago
- Proof of concept & details for CVE-2025-21298☆190Updated 9 months ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆276Updated last year
- Source for challenges from bi0sCTF☆46Updated 4 months ago
- 🎵 Official source code and writeups for SekaiCTF 2025!☆109Updated 2 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆120Updated last year
- Repo for talk slides & materials☆21Updated 11 months ago
- Source code and solution of CTF challenges that I created.☆45Updated 4 months ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- CVE-2024-4577 RCE PoC☆25Updated 11 months ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆169Updated 9 months ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆83Updated last year