sickcodes / no-sandboxLinks
No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: https://no-sandbox.io/
☆187Updated 4 years ago
Alternatives and similar repositories for no-sandbox
Users that are interested in no-sandbox are comparing it to the libraries listed below
Sorting:
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆227Updated 4 years ago
- loot source code from sonarqube☆84Updated 5 years ago
- Linux kernel exploits for local privilege escalation☆81Updated 7 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- A Docker image with four popular Java decompilers in one place (CFR, Fernflower, Krakatau, and Procyon)☆75Updated 3 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Updated 3 years ago
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆184Updated 3 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆123Updated 5 years ago
- CVE-2020-????☆106Updated 5 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Updated 3 years ago
- Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.☆235Updated 4 years ago
- Minimal code to connect to a CEF debugger.☆211Updated 5 years ago
- CVE-2020-1206 Uninitialized Kernel Memory Read POC☆147Updated 5 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)☆72Updated 4 years ago
- 🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2…☆170Updated 4 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆232Updated 5 years ago
- research☆151Updated last year
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆220Updated 2 years ago
- A variant analysis and visualisation tool that scans codebases for similar vulnerabilities☆73Updated 3 years ago
- ☆34Updated 3 years ago
- CVE-2022-22639: Get a Root Shell on macOS Monterey☆122Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆163Updated last year
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Updated 5 years ago
- Cisco ASA Software and ASDM Security Research☆86Updated 3 years ago
- Linux kernel XFRM UAF poc (3.x - 5.x kernels)☆137Updated 5 years ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.☆214Updated 3 years ago