theart42 / cvesLinks
CVE's we discovered along the way
☆17Updated 4 years ago
Alternatives and similar repositories for cves
Users that are interested in cves are comparing it to the libraries listed below
Sorting:
- Local Privilege Escalation Miner☆29Updated 3 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆24Updated 4 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 4 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Updated 4 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Simple AV Evasion for PE Files☆42Updated 4 years ago
- Community documentation for known Hack The Box v4 API endpoints☆26Updated 3 years ago
- Presentaciones de congresos☆54Updated last year
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆23Updated 6 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆50Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.☆44Updated 3 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 4 years ago
- Windows internals and exploitation tricks☆106Updated 2 weeks ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆32Updated 2 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- ☆21Updated 3 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆14Updated 6 years ago
- Stack Based buffer overflow attack☆19Updated 2 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆38Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- ☆48Updated 2 years ago