☆25Jul 19, 2024Updated last year
Alternatives and similar repositories for vmware-escape-CVE-2023-20872-poc
Users that are interested in vmware-escape-CVE-2023-20872-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Sep 8, 2023Updated 2 years ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆81Feb 5, 2025Updated last year
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- on Mac 10.12.2☆20Aug 3, 2018Updated 7 years ago
- ☆287Apr 23, 2020Updated 5 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆147Jan 23, 2021Updated 5 years ago
- Exploits for a heap overflow in MiniDLNA <=1.3.2 (CVE-2023-33476)☆19Jun 20, 2023Updated 2 years ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- ☆17Apr 30, 2024Updated last year
- ☆64Aug 15, 2023Updated 2 years ago
- ☆64Mar 14, 2024Updated 2 years ago
- PoC for CVE-2020-1015☆39May 16, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- qemu vulnerablity.☆56May 25, 2021Updated 4 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆107Jan 13, 2026Updated 2 months ago
- HnuSec 海南大学网安实验室☆13Jan 30, 2024Updated 2 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- ☆10Mar 3, 2024Updated 2 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 5 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆99Mar 29, 2023Updated 3 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Jul 27, 2020Updated 5 years ago
- attachments for forum of RealWorld CTF 3rd☆42Jan 7, 2021Updated 5 years ago
- Easily debug processes running in docker containers☆29Jun 22, 2024Updated last year
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- A collection of POP exploits.☆30Feb 22, 2021Updated 5 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆43Jun 15, 2020Updated 5 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆103Nov 20, 2022Updated 3 years ago
- ☆25Sep 27, 2023Updated 2 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- Code of Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices (NDSS 2025)☆24Apr 11, 2025Updated 11 months ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago