ant4g0nist/Vulnerable-Kext
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Language: C
#driver #exploit_development #exploitation #ios #kernel #macos #memory_corruption #vulnerabilities #xnu
Stars: 124 Issues: 0 Forks: 11
https://github.com/ant4g0nist/Vulnerable-Kext
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Language: C
#driver #exploit_development #exploitation #ios #kernel #macos #memory_corruption #vulnerabilities #xnu
Stars: 124 Issues: 0 Forks: 11
https://github.com/ant4g0nist/Vulnerable-Kext
GitHub
GitHub - ant4g0nist/Vulnerable-Kext: A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation - ant4g0nist/Vulnerable-Kext
0xyg3n/UAC_Exploit
Escalate as Administrator bypassing the UAC affecting administrator accounts only.
Language: C#
#csharp #exploit #silent #uac #uac_authorization #uac_bypass #uacbypass #windows
Stars: 105 Issues: 0 Forks: 25
https://github.com/0xyg3n/UAC_Exploit
Escalate as Administrator bypassing the UAC affecting administrator accounts only.
Language: C#
#csharp #exploit #silent #uac #uac_authorization #uac_bypass #uacbypass #windows
Stars: 105 Issues: 0 Forks: 25
https://github.com/0xyg3n/UAC_Exploit
GitHub
GitHub - 0xyg3n/UAC_Exploit: Escalate as Administrator bypassing the UAC affecting administrator accounts only.
Escalate as Administrator bypassing the UAC affecting administrator accounts only. - 0xyg3n/UAC_Exploit
terorie/cve-2021-3449
CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
Language: Go
#cve_2021_3449 #denial_of_service #exploit #openssl #tls
Stars: 156 Issues: 1 Forks: 26
https://github.com/terorie/cve-2021-3449
CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
Language: Go
#cve_2021_3449 #denial_of_service #exploit #openssl #tls
Stars: 156 Issues: 1 Forks: 26
https://github.com/terorie/cve-2021-3449
GitHub
GitHub - riptl/cve-2021-3449: CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻
CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻 - riptl/cve-2021-3449
sickcodes/no-sandbox
No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: https://no-sandbox.io/
#0day #bug #bugbounty #chrome #chromium #exploit #rce #research
Stars: 91 Issues: 2 Forks: 8
https://github.com/sickcodes/no-sandbox
No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: https://no-sandbox.io/
#0day #bug #bugbounty #chrome #chromium #exploit #rce #research
Stars: 91 Issues: 2 Forks: 8
https://github.com/sickcodes/no-sandbox
no-sandbox
No Sandbox
No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: https://no-sandbox.io/
Cr4sh/KernelForge
A library to develop kernel level Windows payloads for post HVCI era
Language: C++
#windows #library #kernel #exploit #hypervisor #vbs #rookit #hvci
Stars: 105 Issues: 0 Forks: 21
https://github.com/Cr4sh/KernelForge
A library to develop kernel level Windows payloads for post HVCI era
Language: C++
#windows #library #kernel #exploit #hypervisor #vbs #rookit #hvci
Stars: 105 Issues: 0 Forks: 21
https://github.com/Cr4sh/KernelForge
GitHub
GitHub - Cr4sh/KernelForge: A library to develop kernel level Windows payloads for post HVCI era
A library to develop kernel level Windows payloads for post HVCI era - Cr4sh/KernelForge
stong/CVE-2020-15368
How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys
Language: C++
#windows #kernel #exploit
Stars: 119 Issues: 0 Forks: 11
https://github.com/stong/CVE-2020-15368
How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys
Language: C++
#windows #kernel #exploit
Stars: 119 Issues: 0 Forks: 11
https://github.com/stong/CVE-2020-15368
GitHub
GitHub - stong/CVE-2020-15368: CVE-2020-15368, aka "How to exploit a vulnerable driver"
CVE-2020-15368, aka "How to exploit a vulnerable driver" - stong/CVE-2020-15368
HuskyHacks/ShadowSteal
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Language: Nim
#windows #nim #exploit #exploit_development
Stars: 112 Issues: 0 Forks: 25
https://github.com/HuskyHacks/ShadowSteal
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Language: Nim
#windows #nim #exploit #exploit_development
Stars: 112 Issues: 0 Forks: 25
https://github.com/HuskyHacks/ShadowSteal
GitHub
GitHub - HuskyHacks/ShadowSteal: Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation
Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation - HuskyHacks/ShadowSteal
nerdsinspace/nocom-explanation
block game military grade radar
#minecraft #exploit #radar #exploitation #2b2t #papermc #nocomment #nocom
Stars: 113 Issues: 3 Forks: 6
https://github.com/nerdsinspace/nocom-explanation
block game military grade radar
#minecraft #exploit #radar #exploitation #2b2t #papermc #nocomment #nocom
Stars: 113 Issues: 3 Forks: 6
https://github.com/nerdsinspace/nocom-explanation
GitHub
GitHub - nerdsinspace/nocom-explanation: block game military grade radar
block game military grade radar. Contribute to nerdsinspace/nocom-explanation development by creating an account on GitHub.
assetnote/batchql
GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations
Language: Python
#batch #exploit #graphql
Stars: 113 Issues: 0 Forks: 6
https://github.com/assetnote/batchql
GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations
Language: Python
#batch #exploit #graphql
Stars: 113 Issues: 0 Forks: 6
https://github.com/assetnote/batchql
GitHub
GitHub - assetnote/batchql: GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations
GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations - assetnote/batchql
Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches
Language: Java
#bugbounttips #bugbounty #bugbounty_writeups #cve #cve_2021_44228 #cybersecurity #exploit #hacking #log4j #payload #pentest #pentesting #red_team #security #security_writeups #writeups
Stars: 191 Issues: 0 Forks: 38
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches
Language: Java
#bugbounttips #bugbounty #bugbounty_writeups #cve #cve_2021_44228 #cybersecurity #exploit #hacking #log4j #payload #pentest #pentesting #red_team #security #security_writeups #writeups
Stars: 191 Issues: 0 Forks: 38
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
GitHub
GitHub - Puliczek/CVE-2021-44228-PoC-log4j-bypass-words: 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks - Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
DavidBuchanan314/ambiguous-png-packer
Craft PNG files that appear completely different in Apple software
Language: Python
#apple #exploit #idot #png #png_encoder
Stars: 389 Issues: 1 Forks: 8
https://github.com/DavidBuchanan314/ambiguous-png-packer
Craft PNG files that appear completely different in Apple software
Language: Python
#apple #exploit #idot #png #png_encoder
Stars: 389 Issues: 1 Forks: 8
https://github.com/DavidBuchanan314/ambiguous-png-packer
GitHub
GitHub - DavidBuchanan314/ambiguous-png-packer: Craft PNG files that appear completely different in Apple software [NOW PATCHED]
Craft PNG files that appear completely different in Apple software [NOW PATCHED] - DavidBuchanan314/ambiguous-png-packer
mufeedvh/moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Language: Rust
#cve #exploit #exploitation #infosec #infosectools #linux #privilege_escalation #red_teaming #redteam #redteam_tools #security #security_tools
Stars: 279 Issues: 0 Forks: 23
https://github.com/mufeedvh/moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Language: Rust
#cve #exploit #exploitation #infosec #infosectools #linux #privilege_escalation #red_teaming #redteam #redteam_tools #security #security_tools
Stars: 279 Issues: 0 Forks: 23
https://github.com/mufeedvh/moonwalk
GitHub
GitHub - mufeedvh/moonwalk: Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. - mufeedvh/moonwalk