CVE's we discovered along the way
☆17Oct 18, 2021Updated 4 years ago
Alternatives and similar repositories for cves
Users that are interested in cves are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- CVE-2018-16341 - Nuxeo Remote Code Execution without authentication using Server Side Template Injection☆24Jun 5, 2019Updated 6 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Jun 11, 2023Updated 2 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated last year
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- a reliable C based exploit and writeup for CVE-2021-3560.☆39Jun 23, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- My attempt at writing exploit POCs for various CVEs☆16Feb 8, 2020Updated 6 years ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- Simple minimalistic blog for 42 students☆11Dec 20, 2021Updated 4 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆25Mar 17, 2026Updated last week
- TightVNC Vulnerability.☆16Jan 26, 2022Updated 4 years ago
- URL Fuzzer☆20Nov 22, 2024Updated last year
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- Bill Joy's original ex☆17Aug 15, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Github repository which contains a functional exploit for CVE-2021-39165☆22Jul 13, 2022Updated 3 years ago
- linux debugger☆11Sep 29, 2023Updated 2 years ago
- some sploits☆19Sep 20, 2024Updated last year
- Project template for windows kernel development.☆14Jun 25, 2023Updated 2 years ago
- ☆13Jan 12, 2022Updated 4 years ago
- ☆11Apr 30, 2021Updated 4 years ago
- An implementation of the DNS rebinding attack.☆16Apr 14, 2017Updated 8 years ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆15Mar 25, 2017Updated 9 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 3 years ago
- PlayGround with JWTs used as OAuth 2.0 Bearer Tokens to encode all relevant parts of an access token into the access token itself instead…☆16Aug 21, 2021Updated 4 years ago
- Python API for interacting with sigma rules.☆54Jul 1, 2022Updated 3 years ago
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago