synacktiv / CVE-2021-3492View external linksLinks
PoC for CVE-2021-3492 used at Pwn2Own 2021
☆42Aug 3, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-3492
Users that are interested in CVE-2021-3492 are comparing it to the libraries listed below
Sorting:
- ☆20May 24, 2021Updated 4 years ago
- ☆31Feb 20, 2022Updated 3 years ago
- CTF Write-ups☆29Apr 20, 2021Updated 4 years ago
- ☆103Mar 8, 2022Updated 3 years ago
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 3 years ago
- ☆39Feb 10, 2021Updated 5 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Demo exploit code for CVE-2020-27904, a tfp0 bug.☆68Apr 29, 2021Updated 4 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- ☆17Feb 29, 2020Updated 5 years ago
- CryptexManager is an open-source replacement for cryptexctl☆18May 16, 2022Updated 3 years ago
- Detailed Airplay Protocol Specification☆25Jul 8, 2022Updated 3 years ago
- App sandbox escapes for macOS☆31May 20, 2020Updated 5 years ago
- ☆246Sep 6, 2022Updated 3 years ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- ☆22Mar 6, 2023Updated 2 years ago
- a7 sep bug☆55Sep 26, 2023Updated 2 years ago
- IDA plugin to find code cross references to virtual functions using PAC codes☆147Mar 16, 2022Updated 3 years ago
- some research results of sep☆20Apr 9, 2021Updated 4 years ago
- Apple Hypervisor.framework bindings for Golang☆34Jan 12, 2026Updated last month
- Exploit for CVE-2023-32364☆22Sep 26, 2023Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆146Aug 17, 2022Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- ☆49Jun 30, 2020Updated 5 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Rust bindings fo the Apple Silicon Hypervisor.framework☆49Jan 14, 2026Updated last month
- My collection of PoCs☆26Nov 9, 2023Updated 2 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Nov 20, 2017Updated 8 years ago
- Runtime code injection suite for exploring OS X process security☆40Jun 1, 2009Updated 16 years ago
- Recursive MMIO VM Escape PoC☆171May 13, 2022Updated 3 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Golang bindings for the Binary Ninja Arm64 Disassembler.☆14Nov 24, 2025Updated 2 months ago