Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 36 million developers.
Sign up-
SAP_GW_RCE_exploit
Forked from chipik/SAP_GW_RCE_exploitSAP Gateway RCE exploits
-
Cuckoo Sandbox plugin for extracts configuration data of known malware
-
-
CVE-2019-0841
Forked from rogue-kdc/CVE-2019-0841PoC code for CVE-2019-0841 Privilege Escalation vulnerability
-
malware-research
Forked from eset/malware-researchCode written as part of our various malware investigations http://www.welivesecurity.com/
-
-
oletools
Forked from decalage2/oletoolsoletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
-
KeyTabExtract
Forked from sosdave/KeyTabExtractExtracts Key Values from .keytab files
-
EFF-Surveillance-Self-Defense-Vietnamese-translation
Forked from trietptm/EFF-Surveillance-Self-Defense-Vietnamese-translationBản dịch tài liệu bảo mật Surveillance Self-Defense của Electronic Frontier Foundation (EFF) https://ssd.eff.org/en
1 UpdatedApr 6, 2019 -
RE-iOS-Apps
Forked from ivRodriguezCA/RE-iOS-AppsA completely free, open source and online course about Reverse Engineering iOS Applications.
144 UpdatedApr 2, 2019 -
-
CHAOS-2
Forked from tiagorlampert/CHAOS🔥 CHAOS is a PoC that allow generate payloads and control remote operating systems. -
objc_msgSend_hook
Forked from czqasngit/objc_msgSend_hook学习objc_msgSend过程的记录,精简且完整的hook核心功能详细注释
-
xctool
Forked from facebook/xctoolAn extension for Apple's xcodebuild that makes it easier to test iOS and macOS apps.
-
powend
Forked from 0x36/powendpowerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices
-
-
CVE-2018-11686
Forked from mpgn/CVE-2018-11686CVE-2018-11686 - FlexPaper PHP Publish Service RCE <= 2.3.6
-
tccprofile
Forked from carlashley/tccprofileCreates a TCC profile for new Privacy Payloads in macOS Mojave
-
munki
Forked from munki/munkiManaged software installation for macOS —
-
CVE-2019-5786
Forked from exodusintel/CVE-2019-5786FileReader Exploit
-
HoRNDIS
Forked from jwise/HoRNDISAndroid USB tethering driver for Mac OS X
-
ProfileCreator
Forked from erikberglund/ProfileCreatormacOS Application to create standard or customized configuration profiles.
24 UpdatedMar 10, 2019 -
-
machswap2
Forked from PsychoTea/machswap2An iOS kernel exploit for iOS 11 through 12.1.2. Works on A7 - A11 devices.
-
machswap
Forked from PsychoTea/machswapAn iOS kernel exploit for iOS 11 through 12.1.2. Non-SMAP (<=A9) devices only.
-
libpointing
Forked from INRIA/libpointingAn open-source cross-platform library to get raw events from pointing devices and master transfer functions.
-
-
cve-2019-6453-poc
Forked from proofofcalc/cve-2019-6453-pocProof of calc for CVE-2019-6453
11 UpdatedFeb 18, 2019 -
CVE-2019-8389
Forked from shawarkhanethicalhacker/CVE-2019-8389[CVE-2019-8389] An exploit code for exploiting a local file read vulnerability in Musicloud v1.6 iOS Application
-
Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)