CVE-2022-39227 : Proof of Concept
☆22Mar 19, 2024Updated last year
Alternatives and similar repositories for CVE-2022-39227
Users that are interested in CVE-2022-39227 are comparing it to the libraries listed below
Sorting:
- Werkzeug password cracker☆19Nov 14, 2024Updated last year
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆218Dec 4, 2024Updated last year
- Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty…☆25Jan 13, 2024Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Mar 3, 2021Updated 5 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- This shell script fix VMWare 17.x "cannot open /dev/vmmon" error in Ubuntu 21.10 and Ubuntu 22.04☆11Feb 5, 2023Updated 3 years ago
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆17Sep 4, 2023Updated 2 years ago
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year
- [WIP] revamping the repo to publish on hugo themes☆13May 11, 2025Updated 9 months ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- Like rc but better ;)☆11Jun 21, 2017Updated 8 years ago
- The agent for kube-advisor.io☆14Jan 28, 2025Updated last year
- A collection of tools for the Janus exploit [CVE-2017-13156].☆11Oct 22, 2019Updated 6 years ago
- ☆11Dec 31, 2018Updated 7 years ago
- Picarch is a Python project for face detection and image similarity search using insightface and PostgreSQL.☆14Apr 8, 2025Updated 11 months ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- A curated list of CPU Schedulers for linux☆13Mar 7, 2022Updated 4 years ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- ☆15Feb 2, 2022Updated 4 years ago
- ☆10Feb 2, 2024Updated 2 years ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 6 months ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- Linux-kernel related code (patch form mark1/logibone support, kernel modules for communication, etc), can link to supported repositories☆23Apr 12, 2017Updated 8 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Asynchronous Python Wrapper For EgyBest-API.☆14Sep 3, 2024Updated last year
- A multi-user collaborative platform for creating and inhabiting text based literary worlds.☆12Nov 2, 2020Updated 5 years ago
- CVE-2024-0044☆12Aug 24, 2024Updated last year
- Mobster is a tool that can help you get deeper understanding into the performance of mobile web applications on real mobile devices☆38Mar 27, 2013Updated 12 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆29Jan 29, 2026Updated last month
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Detect and bypass Istio sidecar☆21Sep 24, 2021Updated 4 years ago
- An open-source knowledge base for security researchers.☆18Jan 8, 2025Updated last year
- ☆15May 22, 2023Updated 2 years ago
- Material e instructivo para el Workshop de nerdearla 101 v2☆13Jul 27, 2022Updated 3 years ago
- ☆17Apr 30, 2024Updated last year
- Disable Kernel DMA Protection on Windows 11 via pre-boot DMA attack☆49Aug 18, 2025Updated 6 months ago