tin-z / CVE-2023-35086-POCLinks
POC of CVE-2023-35086 only DoS
☆45Updated last year
Alternatives and similar repositories for CVE-2023-35086-POC
Users that are interested in CVE-2023-35086-POC are comparing it to the libraries listed below
Sorting:
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago
- Proof of concept code for CVE-2023-2008☆41Updated 2 years ago
- ☆63Updated last year
- Shielder's public proof of concepts collection☆33Updated 10 months ago
- ☆42Updated 2 years ago
- Simple WebSocket fuzzer☆33Updated 2 years ago
- LPE exploit for CVE-2024-0582 (io_uring)☆101Updated last year
- A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3.☆21Updated last year
- xortigate-cve-2023-27997☆64Updated last year
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Updated 3 years ago
- ☆86Updated 2 years ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆48Updated 11 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 7 months ago
- PoC for CVE-2023-28771 based on Rapid7's excellent writeup☆29Updated 2 years ago
- ☆80Updated 10 months ago
- ☆16Updated last year
- Cisco ASA Software and ASDM Security Research☆85Updated 2 years ago
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆34Updated 2 years ago
- ☆26Updated last year
- Universal root exploit for the linux kernel☆32Updated last year
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆84Updated 2 years ago
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆91Updated 5 months ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 years ago
- ☆32Updated 2 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- Proof-of-Concept for CVE-2024-21345☆74Updated last year
- Foxit PDF Reader Remote Code Execution Exploit☆117Updated last year
- Analysis of the vulnerability☆51Updated last year