taviso / cefdebugLinks
Minimal code to connect to a CEF debugger.
☆207Updated 5 years ago
Alternatives and similar repositories for cefdebug
Users that are interested in cefdebug are comparing it to the libraries listed below
Sorting:
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆423Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 8 months ago
- A tool to exploit .NET Remoting Services☆516Updated 11 months ago
- Vulnerability examples.☆406Updated last year
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Updated 4 years ago
- collect for learning cases☆587Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 2 years ago
- Automatic exploit generation for simple linux pwn challenges.☆322Updated 2 years ago
- ☆802Updated 2 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆145Updated 3 years ago
- Public work for CVE-2019-0708☆292Updated 5 years ago
- Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.☆232Updated 4 years ago
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)☆890Updated 5 years ago
- VerSprite Security Research☆169Updated 2 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- Checksec tool in Python, Rich output. Based on LIEF☆337Updated 3 weeks ago
- ☆270Updated 2 years ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆209Updated 2 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆436Updated 2 years ago
- PrintDemon is a PoC for a series of issues in the Windows Print Spooler service, as well as potetial misuses of the functionality.☆202Updated 5 years ago
- research☆151Updated last year
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Slide decks from my conference presentations☆364Updated last year
- Basic Electron Exploitation☆211Updated 5 years ago
- OSEE Preparation☆182Updated 6 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆124Updated 4 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 3 years ago
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆224Updated 5 years ago
- ☆265Updated 2 years ago