Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation leak
exploitation
x
leak
x
3 search results found
Iohideous
⭐
443
IOHIDFamily 0day
Danderspritz_docs
⭐
206
The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-exploitation framework leaked by the ShadowBrokers
Roobet Crypto Casino Predictor
⭐
170
Roobet Crypto Predictor that supports almost all Roobet games
Roobet Crypto Casino Predictor
⭐
169
Roobet Crypto Predictor that supports almost all Roobet games
Roobet Crypto Casino Predictor
⭐
165
Roobet Crypto Predictor that supports almost all Roobet games
Roobet Crypto Casino Predictor
⭐
97
Roobet Crypto Predictor that supports almost all Roobet games
Roobet Crypto Casino Predictor
⭐
96
Roobet Crypto Predictor that supports almost all Roobet games
Valorant Xhx
⭐
96
Valorant CHEAT - INCLUDING: AIMBOT, WH, NORELOAD, NORECOIL, SKINCHANGER & MORE
Roobet Crypto Casino Predictor
⭐
88
Roobet Crypto Predictor that supports almost all Roobet games
Roobet Crypto Casino Predictor
⭐
85
Roobet Crypto Predictor that supports almost all Roobet games
Roobet Crypto Casino Predictor
⭐
79
Roobet Crypto Predictor that supports almost all Roobet games
Roobet Crypto Casino Predictor
⭐
79
Roobet Crypto Predictor that supports almost all Roobet games
Roobet Crypto Casino Predictor
⭐
58
Roobet Crypto Predictor that supports almost all Roobet games
Xpc String Leak
⭐
46
CVE-2018-4248: Out-of-bounds read in libxpc during string serialization.
Stackjacking
⭐
42
PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"
Windowsland
⭐
41
HITCON CTF 2018
Nekito
⭐
26
Open-Source Crash client based on Niko by @narumii
Cve 2014 4378
⭐
15
Tickshift
⭐
13
The code for the TickShift exploit
Nsa_equation_group_leak
⭐
13
FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS
Hsevd Arbitraryoverwritelowil
⭐
12
HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System
Google Translate Exploit
⭐
10
Google Translate Translation Exploit
Colorguard
⭐
10
Concolic tracer to detect flag leaks and create Type-2 POVs.
Foe
⭐
6
Materials for the IAP 2018 Fundamentals of Exploitation course
The_night
⭐
6
Tool for using libc infoleaks to identify libc version from within your exploit.
Explnode
⭐
5
An exploitable nodejs application
Related Searches
Python Exploitation (1,616)
Exploitation Cve (771)
Vulnerabilities Exploitation (629)
C Exploitation (548)
Exploitation Penetration Testing (353)
Leak Memory Leaks (321)
1-3 of 3 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.