☆12Jul 25, 2019Updated 6 years ago
Alternatives and similar repositories for CVE-2019-0708-exp
Users that are interested in CVE-2019-0708-exp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆21May 9, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- cve-2019-0604 SharePoint RCE exploit☆40Jun 26, 2019Updated 6 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- ☆17Jun 17, 2022Updated 3 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- ☆26Sep 2, 2025Updated 6 months ago
- ☆27Mar 8, 2018Updated 8 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 7 years ago
- Firmware for the Zyxel VMG3925-B10B☆22Feb 12, 2020Updated 6 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Win32k Exploit by Grant Willcox☆91May 17, 2019Updated 6 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆29Nov 14, 2018Updated 7 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- a safedog fuzzing python script☆18Apr 15, 2018Updated 7 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- it works on xp (all version sp2 sp3)☆75Sep 30, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- cve-2019-0808-poc☆48Mar 25, 2019Updated 7 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.☆41Jan 19, 2019Updated 7 years ago
- Binary Ninja plugin providing various niche utilities for working with PE binaries☆10Nov 30, 2023Updated 2 years ago
- ☆15Mar 28, 2015Updated 11 years ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- ☆12Jun 10, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- The parser-directed Fuzzer☆40May 22, 2020Updated 5 years ago
- python security audit tool,用于python源码的代码审计,支持命令注入,sql注入☆63Jun 4, 2015Updated 10 years ago
- CVE-2020-27950 exploit☆34Dec 1, 2020Updated 5 years ago
- 远控源码☆43Feb 13, 2019Updated 7 years ago
- linux system call hook framework☆47Jan 18, 2019Updated 7 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- Super simple Unicorn based CLI arm64 emulator☆11Nov 11, 2020Updated 5 years ago