ze0r / CVE-2019-0708-expView external linksLinks
☆12Jul 25, 2019Updated 6 years ago
Alternatives and similar repositories for CVE-2019-0708-exp
Users that are interested in CVE-2019-0708-exp are comparing it to the libraries listed below
Sorting:
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- ☆17Jun 17, 2022Updated 3 years ago
- cve-2019-0604 SharePoint RCE exploit☆40Jun 26, 2019Updated 6 years ago
- a safedog fuzzing python script☆18Apr 15, 2018Updated 7 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- Firmware for the Zyxel VMG3925-B10B☆22Feb 12, 2020Updated 6 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆21May 9, 2019Updated 6 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- Win32k Exploit by Grant Willcox☆91May 17, 2019Updated 6 years ago
- ☆26Sep 2, 2025Updated 5 months ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 7 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆28Nov 14, 2018Updated 7 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- ☆27Mar 8, 2018Updated 7 years ago
- CVE-2020-27950 exploit☆34Dec 1, 2020Updated 5 years ago
- ☆127Apr 8, 2019Updated 6 years ago
- it works on xp (all version sp2 sp3)☆75Sep 30, 2019Updated 6 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- ☆10Dec 9, 2019Updated 6 years ago
- ☆30May 22, 2019Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆40May 13, 2019Updated 6 years ago
- CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.☆40Jan 19, 2019Updated 7 years ago
- Some debug notes and exploit(not blind)☆39Jul 28, 2019Updated 6 years ago
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- Overlay rainbow on GIFs!☆12Oct 5, 2025Updated 4 months ago
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- The parser-directed Fuzzer☆40May 22, 2020Updated 5 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Python port of Boilerpipe library☆16Apr 6, 2018Updated 7 years ago
- 《美国反对美国》是王沪宁先生在上世纪80年代末赴美观察写作的。我们知道在那个年代中国对西方特别是美国的追捧有多高,所以突然看到一个学者在80年代就有如此清楚的认识,十分钦佩。由于网上只有效果很差的PDF扫描版,所以我想利用OCR技术和肉眼(人体OCR)来转成现代化的文本格式…☆11Aug 26, 2020Updated 5 years ago
- Class File Analyzer (CFA)☆12Sep 24, 2025Updated 4 months ago
- phylo2vec: a library for vector-based phylogenetic tree manipulation☆20Feb 9, 2026Updated last week