tacnetsol / CVE-2019-10999Links
Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well.
☆41Updated 3 years ago
Alternatives and similar repositories for CVE-2019-10999
Users that are interested in CVE-2019-10999 are comparing it to the libraries listed below
Sorting:
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆144Updated 4 years ago
- A tool for finding the one gadget RCE in libc☆78Updated 5 years ago
- A happy heap editor to support your exploitation process☆197Updated 4 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆50Updated 2 years ago
- A collection of curated resources and CVEs I use for research.☆108Updated 4 years ago
- A de-socketing library for fuzzing.☆160Updated 2 months ago
- Fork Free Fail Repeat☆49Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆70Updated 8 years ago
- Automatic ROPChain Generation☆294Updated 5 years ago
- ☆98Updated 2 years ago
- PEDA - Python Exploit Development Assistance for GDB☆23Updated 2 months ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆149Updated 2 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- My CTF writeups☆27Updated 4 years ago
- Binarly Vulnerability Research Advisories☆181Updated 2 weeks ago
- A binary hardening system☆109Updated 2 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆126Updated 8 years ago
- Where CTFs happen☆82Updated last year
- A library for patching ELFs☆57Updated 4 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆122Updated 4 years ago
- ☆95Updated 3 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Updated 4 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago
- NVRAM emulator☆93Updated last year
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆60Updated 3 years ago
- Research related☆89Updated 3 years ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Updated 2 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago