taviso / cefdebugLinks
Minimal code to connect to a CEF debugger.
☆208Updated 5 years ago
Alternatives and similar repositories for cefdebug
Users that are interested in cefdebug are comparing it to the libraries listed below
Sorting:
- A tool to exploit .NET Remoting Services☆519Updated last year
- A repository of previous info-sec presentations I've presented.☆161Updated 9 months ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆424Updated 3 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆237Updated 5 years ago
- Vulnerability examples.☆407Updated last year
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 3 years ago
- VerSprite Security Research☆170Updated 2 years ago
- ☆270Updated 2 years ago
- collection of verified Linux kernel exploits☆188Updated 4 years ago
- PrintDemon is a PoC for a series of issues in the Windows Print Spooler service, as well as potetial misuses of the functionality.☆202Updated 5 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 2 years ago
- Public work for CVE-2019-0708☆292Updated 5 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆204Updated 2 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆145Updated 4 years ago
- research☆151Updated last year
- PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)☆891Updated 5 years ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆209Updated 2 years ago
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆224Updated 5 years ago
- Automatic exploit generation for simple linux pwn challenges.☆322Updated 2 years ago
- Encrypted exploit delivery for the masses☆268Updated 5 years ago
- DupeKeyInjector☆135Updated 3 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆124Updated 4 years ago
- Linux privilege escalation via LXD☆136Updated 5 years ago
- ☆265Updated 2 years ago
- collect for learning cases☆589Updated last year
- ☆807Updated 2 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆437Updated 2 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆78Updated 6 years ago
- Linux kernel XFRM UAF poc (3.x - 5.x kernels)☆135Updated 5 years ago