CVE's we discovered along the way
☆17Oct 18, 2021Updated 4 years ago
Alternatives and similar repositories for cves
Users that are interested in cves are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Jun 11, 2023Updated 2 years ago
- ☆16Apr 21, 2023Updated 3 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated last year
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- MSDN data annotation for radare2☆13Jul 2, 2024Updated last year
- a reliable C based exploit and writeup for CVE-2021-3560.☆40Jun 23, 2021Updated 4 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- My attempt at writing exploit POCs for various CVEs☆15Feb 8, 2020Updated 6 years ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple minimalistic blog for 42 students☆11Dec 20, 2021Updated 4 years ago
- TightVNC Vulnerability.☆16Jan 26, 2022Updated 4 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆27Apr 28, 2026Updated last week
- URL Fuzzer☆20Nov 22, 2024Updated last year
- Rust开发一个玩具语言☆12Sep 19, 2022Updated 3 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- ☆11Jun 19, 2024Updated last year
- Github repository which contains a functional exploit for CVE-2021-39165☆22Jul 13, 2022Updated 3 years ago
- linux debugger☆11Sep 29, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- RESEARCH PROJECT - A project meant to explore some of the common UX/DX issues related to Solana's ecosystem and finding ways around them☆11Jan 29, 2022Updated 4 years ago
- some sploits☆19Sep 20, 2024Updated last year
- ☆13Jan 12, 2022Updated 4 years ago
- ☆14Dec 2, 2020Updated 5 years ago
- PwnKit-Hunter is here to help you check if your systems are vulnerable to CVE-2021-4043, a.k.a. PwnKit☆27Feb 1, 2022Updated 4 years ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- An implementation of the DNS rebinding attack.☆16Apr 14, 2017Updated 9 years ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 4 years ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- PlayGround with JWTs used as OAuth 2.0 Bearer Tokens to encode all relevant parts of an access token into the access token itself instead…☆16Aug 21, 2021Updated 4 years ago
- Python API for interacting with sigma rules.☆54Jul 1, 2022Updated 3 years ago
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- i implemented public key cryptosystem, based of RSA algorithme .☆12Sep 17, 2022Updated 3 years ago