Cod Exploits☠️ Call of Duty - Vulnerabilities and proof-of-concepts
Stars: ✭ 178 (-74.2%)
Spectre Meltdown PocA semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Stars: ✭ 127 (-81.59%)
PentestingMisc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-96.52%)
SpectrepocProof of concept code for the Spectre CPU exploit.
Stars: ✭ 239 (-65.36%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-90.87%)
exploitsSome of my public exploits
Stars: ✭ 50 (-92.75%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (-11.01%)
Rxjava2 Android SamplesRxJava 2 Android Examples - Migration From RxJava 1 to RxJava 2 - How to use RxJava 2 in Android
Stars: ✭ 4,950 (+617.39%)
Cve 2018 8120CVE-2018-8120 Windows LPE exploit
Stars: ✭ 447 (-35.22%)
PocProofs-of-concept
Stars: ✭ 467 (-32.32%)
Emacs Elisp ProgrammingTutorial about programming Elisp and Emacs text editor customization.
Stars: ✭ 548 (-20.58%)
HershellMultiplatform reverse shell generator
Stars: ✭ 456 (-33.91%)
Vulkan minimal computeMinimal Example of Using Vulkan for Compute Operations. Only ~400LOC.
Stars: ✭ 603 (-12.61%)
SpecucheckSpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)
Stars: ✭ 542 (-21.45%)
Yii2 ShopExample project implementing simple shop using Yii 2.0
Stars: ✭ 442 (-35.94%)
Cve 2017 0785Blueborne CVE-2017-0785 Android information leak vulnerability
Stars: ✭ 428 (-37.97%)
YsoserialA proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Stars: ✭ 4,808 (+596.81%)
Meta Typing📚 Functions and algorithms implemented purely with TypeScript's type system
Stars: ✭ 628 (-8.99%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-40.14%)
Hardware And Firmware Security GuidanceGuidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
Stars: ✭ 408 (-40.87%)
BytebufExample of how CL133375 can be utilized to mitigate Go escape analysis limitations.
Stars: ✭ 494 (-28.41%)
Firmware slapDiscovering vulnerabilities in firmware through concolic analysis and function clustering.
Stars: ✭ 407 (-41.01%)
ByepgDefeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI
Stars: ✭ 467 (-32.32%)
PupThe Ultimate Boilerplate for Products.
Stars: ✭ 563 (-18.41%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+552.17%)
Amazon Sagemaker ExamplesExample 📓 Jupyter notebooks that demonstrate how to build, train, and deploy machine learning models using 🧠 Amazon SageMaker.
Stars: ✭ 6,346 (+819.71%)
Drupalgeddon2Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)
Stars: ✭ 464 (-32.75%)
Am I Affected By MeltdownMeltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.
Stars: ✭ 549 (-20.43%)
Electron With ExpressA simple app that demonstrates spawning an Express app from Electron
Stars: ✭ 454 (-34.2%)
Stm32 BootloaderCustomizable Bootloader for STM32 microcontrollers. This example demonstrates how to perform in-application-programming of a firmware located on an external SD card with FAT32 file system.
Stars: ✭ 541 (-21.59%)
HvmiHypervisor Memory Introspection Core Library
Stars: ✭ 438 (-36.52%)
NxloaderMy first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)
Stars: ✭ 417 (-39.57%)
FuzzapiFuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem
Stars: ✭ 521 (-24.49%)
React Redux Complete ExampleA react+redux example project based on the folder structure proposed here: https://github.com/alexnm/re-ducks
Stars: ✭ 415 (-39.86%)
CloakCloak can backdoor any python script with some tricks.
Stars: ✭ 411 (-40.43%)
React From ZeroA simple (99% ES2015 less) tutorial for React
Stars: ✭ 4,638 (+572.17%)
DeauthdetectorDetect deauthentication frames using an ESP8266
Stars: ✭ 406 (-41.16%)
Rop ToolA tool to help you write binary exploits
Stars: ✭ 590 (-14.49%)
MeltdownThis repository contains several applications, demonstrating the Meltdown bug.
Stars: ✭ 3,931 (+469.71%)
Penetration Testing ToolsA collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (-11.01%)
Cve 2019 11708Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (-15.8%)
Firebase Instagram📸 Instagram clone with Firebase Cloud Firestore, Expo, and React Native 😁😍
Stars: ✭ 389 (-43.62%)
Business Machine LearningA curated list of practical business machine learning (BML) and business data science (BDS) applications for Accounting, Customer, Employee, Legal, Management and Operations (by @firmai)
Stars: ✭ 575 (-16.67%)
Ios Nfc Example📱 Example showing how to use the Core NFC API in iOS
Stars: ✭ 480 (-30.43%)