About 16,300 results
Open links in new tab
  1. timb-machine-mirrors/ejpir-CVE-2025-55182-poc - GitHub

    All Verified RCE Gadgets Run node exploit-all-gadgets.js to test all gadgets: ... Any Node.js built-in module exposed in the webpack manifest can be exploited.

  2. timb-machine-mirrors/0x36-Pixel_GPU_Exploit - GitHub

    This exploit leverages two vulnerabilities: an integer overflow resulting from an incomplete patch in the gpu_pixel_handle_buffer_liveness_update_ioctl ioctl command, and an information leak within the …

  3. Universal local privilege escalation Proof-of-Concept exploit for CVE ...

    Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF.

  4. timb-machine-mirrors/XiphosResearch-exploits - GitHub

    We take the quality of our exploit code very seriously. If you find a bug, or an edge case where an exploit fails to succeed against a vulnerable target, do let us know immediately so said situation can …

  5. timb-machine-mirrors/exploits-forsale-collateral-damage

    This exploit is not fully reliable. It relies on a CPU side channel as well as a race condition, both of which have the potential to fail. In the event of a failure, the exploit may alert you that it has failed via …

  6. timb-machine-mirrors/ThottySploity-CVE-2024-53375 - GitHub

    Nov 4, 2024 · Affected Devices TP-Link devices that use the HomeShield functionality are vulnerable to this exploit. This encompasses multiple routers from the TP-Link Archer series.

  7. GitHub - timb-machine-mirrors/0xInfection-EPScalate: Exploit for ...

    The exploit code has been published under the Apache 2.0 License. The vulnerability has been disclosed to the vendor and has been remediated at the time of publishing the vulnerability.

  8. timb-machine-mirrors/Matheus-Garbelini-braktooth_esp32 ... - GitHub

    The exploit tool includes a standalone version of Wireshark which already includes a plugin to read the customized captures saved by our tool. Capture files are automatically saved in folder …

  9. Hourly updated database of exploit and exploitation reports

    Hourly updated database of exploit and exploitation reports - timb-machine-mirrors/gmatuz-inthewilddb

  10. timb-machine-mirrors/xairy-vmware-exploitation - GitHub

    " How to exploit cve 2017 4901" [article] "Escape from VMware Workstation by using "Hearthstone"" [slides] "The Great Escapes of VMware: A Retrospective Case Study of VMware Guest-to-Host …