taviso / cefdebug
Minimal code to connect to a CEF debugger.
☆201Updated 4 years ago
Alternatives and similar repositories for cefdebug:
Users that are interested in cefdebug are comparing it to the libraries listed below
- A repository of previous info-sec presentations I've presented.☆159Updated 3 months ago
- A tool to exploit .NET Remoting Services☆496Updated 6 months ago
- PrintDemon is a PoC for a series of issues in the Windows Print Spooler service, as well as potetial misuses of the functionality.☆200Updated 4 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆238Updated 4 years ago
- ☆763Updated 2 years ago
- collect for learning cases☆575Updated 8 months ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆125Updated 4 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆429Updated 2 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆418Updated 2 years ago
- Dump of win32k POCs for bugs I've found☆370Updated 2 years ago
- TrueType and OpenType font fuzzing toolset☆432Updated 5 years ago
- VerSprite Security Research☆165Updated 2 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆241Updated 2 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 2 years ago
- Vulnerability examples.☆402Updated 9 months ago
- ☆231Updated 7 years ago
- DupeKeyInjector☆135Updated 2 years ago
- collection of verified Linux kernel exploits☆186Updated 4 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆384Updated 4 years ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆267Updated 4 years ago
- Checksec, but for Windows: static detection of security mitigations in executables☆576Updated last month
- ☆267Updated last year
- ☆480Updated 7 years ago
- research☆151Updated 11 months ago
- Simple DNS Rebinding Service☆642Updated 5 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆187Updated 4 years ago
- ☆262Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆315Updated last year
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆140Updated 3 years ago
- Bring your own print driver privilege escalation tool☆247Updated 3 years ago