PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution
☆19Jun 16, 2024Updated last year
Alternatives and similar repositories for poc-cve-2024-38396
Users that are interested in poc-cve-2024-38396 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Dec 30, 2024Updated last year
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆25Jun 29, 2021Updated 4 years ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 6 months ago
- Skill de Pentesting para Android☆131Updated this week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆11Jun 8, 2025Updated 11 months ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆51Oct 12, 2023Updated 2 years ago
- ☆109Feb 14, 2026Updated 2 months ago
- My gfPatterns☆15Aug 31, 2021Updated 4 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Mar 20, 2022Updated 4 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Formalizing Polynomial Commitment Schemes in the Interactive Theorem Prover Isabelle.☆10Apr 20, 2026Updated 2 weeks ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Jan 13, 2022Updated 4 years ago
- ☆14Apr 15, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated last year
- ☆11Feb 10, 2026Updated 2 months ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- HTTP request smuggling tools☆17Aug 17, 2020Updated 5 years ago
- Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdoma…☆61Feb 24, 2026Updated 2 months ago
- Use google dork to search and download easy as gf!☆16Mar 29, 2025Updated last year
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 7 years ago
- sAoccec something about ossec☆17Apr 27, 2013Updated 13 years ago
- Guvenkaya Public Security Assessment Reports☆12Apr 30, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Jul 17, 2024Updated last year
- ☆20Jun 2, 2016Updated 9 years ago
- A set of US names from the last 130 years.☆25Oct 29, 2014Updated 11 years ago
- An ordinary website can make and use by everyone. so What is The difference between a Geek and common people?☆18Sep 24, 2021Updated 4 years ago
- Exploit for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE☆17Apr 17, 2023Updated 3 years ago
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated 2 years ago
- ☆11Jul 15, 2024Updated last year
- An ongoing collection of Go tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical resources.☆25Mar 20, 2022Updated 4 years ago
- ☆36Aug 5, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Writeups for Hack The Box machines/challenges☆26Nov 4, 2021Updated 4 years ago
- 在科研(摸鱼)过程中,收集到的或者自己写的一些有用的(经过实战检验的)exp/poc,欢迎提交issue和PR☆16Oct 15, 2021Updated 4 years ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆192Sep 8, 2024Updated last year
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- ☆25Feb 22, 2025Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆22May 27, 2025Updated 11 months ago