taviso / cefdebugLinks
Minimal code to connect to a CEF debugger.
☆209Updated 5 years ago
Alternatives and similar repositories for cefdebug
Users that are interested in cefdebug are comparing it to the libraries listed below
Sorting:
- A tool to exploit .NET Remoting Services☆525Updated last year
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆427Updated 3 years ago
- Vulnerability examples.☆410Updated last year
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Updated 5 years ago
- Public work for CVE-2019-0708☆292Updated 5 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆162Updated 11 months ago
- research☆151Updated last year
- VerSprite Security Research☆171Updated 2 years ago
- ☆819Updated 2 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- Automatic exploit generation for simple linux pwn challenges.☆320Updated 2 years ago
- collection of verified Linux kernel exploits☆189Updated 4 years ago
- collect for learning cases☆593Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆442Updated 3 years ago
- ☆269Updated 2 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated 3 years ago
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆224Updated 5 years ago
- ☆18Updated 2 years ago
- DupeKeyInjector☆136Updated 3 years ago
- Search for code cave in all binaries☆285Updated last week
- Encrypted exploit delivery for the masses☆267Updated 6 years ago
- Linux privilege escalation via LXD☆139Updated 5 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆78Updated 6 years ago
- ☆272Updated 2 years ago
- PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)☆890Updated 5 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆123Updated 5 years ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆214Updated 2 years ago
- Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.☆234Updated 4 years ago