PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution
☆19Jun 16, 2024Updated last year
Alternatives and similar repositories for poc-cve-2024-38396
Users that are interested in poc-cve-2024-38396 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- The build scripts for static-linux☆14Aug 26, 2015Updated 10 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆25Jun 29, 2021Updated 4 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆108Feb 14, 2026Updated last month
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆51Oct 12, 2023Updated 2 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Mar 20, 2022Updated 4 years ago
- Formalizing Polynomial Commitment Schemes in the Interactive Theorem Prover Isabelle.☆10Jan 24, 2026Updated 2 months ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Jan 13, 2022Updated 4 years ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆67Oct 20, 2025Updated 5 months ago
- ☆12Jun 5, 2024Updated last year
- Tabnabbing demo.☆17Feb 28, 2015Updated 11 years ago
- ☆11Feb 10, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdoma…☆61Feb 24, 2026Updated last month
- Use google dork to search and download easy as gf!☆16Mar 29, 2025Updated last year
- Your go-to resource for all things Smart Contract Security. Featuring guidelines, best practices, and in-depth articles. Sections include…☆21Oct 31, 2023Updated 2 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- Guvenkaya Public Security Assessment Reports☆12Jan 26, 2026Updated 2 months ago
- ☆20Jun 2, 2016Updated 9 years ago
- ☆35Aug 5, 2025Updated 7 months ago
- Exploit for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE☆17Apr 17, 2023Updated 2 years ago
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11Jul 15, 2024Updated last year
- Writeups for Hack The Box machines/challenges☆25Nov 4, 2021Updated 4 years ago
- Basic Blockchain-Based Federated Learning Intrusion Detection System☆12Nov 2, 2022Updated 3 years ago
- Get the urls for all disclosed vulnerabilities☆17Dec 29, 2015Updated 10 years ago
- 在科研(摸鱼)过程中,收集到的或者自己写的一些有用的(经过实战检验的)exp/poc,欢迎提交issue和PR☆16Oct 15, 2021Updated 4 years ago
- ☆12Jan 10, 2024Updated 2 years ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆192Sep 8, 2024Updated last year
- Collection of XSS Payloads from various sources☆29May 8, 2017Updated 8 years ago
- ☆21May 6, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆97Jul 10, 2025Updated 8 months ago
- ☆24Jan 24, 2022Updated 4 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 10 months ago
- Web app for spectators of programming contests☆13Mar 20, 2026Updated last week
- A general purpose foundation for cloud-based fuzzing and mutation testing jobs☆22Jan 15, 2026Updated 2 months ago
- ☆13Dec 15, 2024Updated last year
- teler Caddy integrates the powerful security features of teler WAF into the Caddy web server, ensuring your web servers remain secure and…☆17Feb 24, 2025Updated last year