There are no reviews yet. Be the first to send feedback to the community and the maintainers!
PocOrExp_in_Github
Automatically Collect POC or EXP from GitHub by CVE ID. If you are unable to find the POC/EXP on GitHub, you can also check here: https://pocorexps.nsa.im/WindowsPrivilegeEscalation
Collection of Windows Privilege Escalation (Analyse/PoC/Exp...)LibraryManageDesktopApp
A library manage for windowsWindows_Security_Resources
Windows Security ResourcesSecurity_Articles
爬取安全领域文章(Seebug、先知社区、安全客、freebuf等),转成pdf存到本地,离线学习ast-interpreter
AST interpreter with clang 5.0.0 and llvm 5.0.0Exploits
在科研(摸鱼)过程中,收集到的或者自己写的一些有用的(经过实战检验的)exp/poc,欢迎提交issue和PRCVE-2020-0668
Make CVE-2020-0668 exploit work for version < win10 v1903 and version >= win10 v1903pointer-analyse
pointer-anaylise base on llvm 5.0.0 and clang 5.0.0Log4Shell-CVE-2021-44228-ENV
Log4Shell Docker EnvBlackHat
BlackHatycdxsb.github.io
ycdxsb
sensitive
UCASCompiler2021-Spring
中国科学院大学网络空间安全学院2021年春季编译原理实验llvm-assignment
llvm-assignment with clang 5.0.0 and llvm 5.0.0Vuln
CloudSniffer
A Simple Sniffer using PyQt5 and Scapy on MacDriverBugs
Love Open Source and this site? Check out how you can help us