sickcodes / no-sandboxLinks
No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: https://no-sandbox.io/
☆186Updated 4 years ago
Alternatives and similar repositories for no-sandbox
Users that are interested in no-sandbox are comparing it to the libraries listed below
Sorting:
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆183Updated 3 years ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆224Updated 4 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆188Updated last year
- loot source code from sonarqube☆84Updated 4 years ago
- Electron Research☆71Updated 3 years ago
- Linux kernel exploits for local privilege escalation☆78Updated 6 years ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 4 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.☆232Updated 4 years ago
- XS-Leak Browser Test Suite☆82Updated last year
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆124Updated 4 years ago
- A Docker image with four popular Java decompilers in one place (CFR, Fernflower, Krakatau, and Procyon)☆73Updated 3 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆122Updated 3 years ago
- Cisco ASA Software and ASDM Security Research☆85Updated 2 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Updated 3 years ago
- 🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2…☆168Updated 4 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- CVE-2022-22639: Get a Root Shell on macOS Monterey☆122Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 8 months ago
- Artifacts to the ALPACA attack.☆60Updated 3 years ago
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆224Updated 5 years ago
- ☆133Updated 3 years ago
- A happy heap editor to support your exploitation process☆196Updated 4 years ago
- RCE Exploit for Gitlab < 13.10.3☆61Updated 4 years ago
- CVE-2020-1206 Uninitialized Kernel Memory Read POC☆145Updated 5 years ago
- A variant analysis and visualisation tool that scans codebases for similar vulnerabilities☆73Updated 3 years ago
- CVE-2020-????☆106Updated 5 years ago
- Minimal code to connect to a CEF debugger.☆207Updated 5 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Updated 5 years ago