taviso / cefdebug
Minimal code to connect to a CEF debugger.
☆204Updated 4 years ago
Alternatives and similar repositories for cefdebug:
Users that are interested in cefdebug are comparing it to the libraries listed below
- A tool to exploit .NET Remoting Services☆501Updated 8 months ago
- A repository of previous info-sec presentations I've presented.☆160Updated 5 months ago
- collect for learning cases☆580Updated 9 months ago
- VerSprite Security Research☆165Updated 2 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆621Updated 4 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆418Updated 3 years ago
- Public work for CVE-2019-0708☆290Updated 5 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆429Updated 2 years ago
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆223Updated 4 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- ☆265Updated last year
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆124Updated 4 years ago
- Checksec, but for Windows: static detection of security mitigations in executables☆581Updated 2 months ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆142Updated 3 years ago
- PrintDemon is a PoC for a series of issues in the Windows Print Spooler service, as well as potetial misuses of the functionality.☆201Updated 4 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆385Updated 4 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- Vulnerability examples.☆403Updated 11 months ago
- ☆268Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆319Updated last year
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆204Updated 2 years ago
- Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.☆233Updated 3 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆199Updated 6 years ago
- ☆773Updated 2 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆187Updated 4 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Dump of win32k POCs for bugs I've found☆371Updated 3 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆192Updated 2 years ago