☆12Jul 25, 2019Updated 6 years ago
Alternatives and similar repositories for CVE-2019-0708-exp
Users that are interested in CVE-2019-0708-exp are comparing it to the libraries listed below
Sorting:
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- cve-2019-0604 SharePoint RCE exploit☆40Jun 26, 2019Updated 6 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆21May 9, 2019Updated 6 years ago
- Firmware for the Zyxel VMG3925-B10B☆22Feb 12, 2020Updated 6 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- Win32k Exploit by Grant Willcox☆91May 17, 2019Updated 6 years ago
- ☆26Sep 2, 2025Updated 6 months ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 7 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆28Nov 14, 2018Updated 7 years ago
- ☆27Mar 8, 2018Updated 8 years ago
- CVE-2020-27950 exploit☆34Dec 1, 2020Updated 5 years ago
- ☆127Apr 8, 2019Updated 6 years ago
- it works on xp (all version sp2 sp3)☆75Sep 30, 2019Updated 6 years ago
- ☆10Dec 9, 2019Updated 6 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- ☆30May 22, 2019Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.☆41Jan 19, 2019Updated 7 years ago
- Some debug notes and exploit(not blind)☆39Jul 28, 2019Updated 6 years ago
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- The parser-directed Fuzzer☆40May 22, 2020Updated 5 years ago
- Socks5man is a Socks5 management tool and Python library☆12Mar 10, 2023Updated 2 years ago
- Windows kernel-mode driver Allocator for Rust☆11Oct 8, 2018Updated 7 years ago
- Stock trading system using technical analysis to help investing on the Warsaw Stock Exchange☆10Apr 23, 2017Updated 8 years ago
- IDA Pro plugin to recovery static Thumb2 symbols.☆13Sep 14, 2021Updated 4 years ago
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- ☆12May 2, 2017Updated 8 years ago
- ☆24Jan 30, 2021Updated 5 years ago
- It's only hitting vulnerable path in termdd.sys!!! NOT DOS☆12May 19, 2019Updated 6 years ago
- ttsukiのライブラリです!☆12Dec 5, 2018Updated 7 years ago