Android_FakeID_Exploit

Android FakeID Exploit Link: Android FakeID Exploit

SafeMan

a security tool with the high privilege exploiting the windows kernels: C++ implementation object oriented programming developed with windows DDK there is a portable interface (MFC) find the hidden processes watch the SSDT(System Services Descriptor Ta...

LanguageBackdoors

Exploitable non-obvious source code back doors. Backdoors that are pure obfuscation need not do a pull request... if you have some code that would make a neat backdoor, please send a pull request. I prefer things that are really hard to spot or attack ...

CVE-2023-21608

This bug was Use after Free which was caused during resetForm operation while handling object memory references. console.show(); var chunks =; var bufs =; var arrs =; function PropAccClosure(obj, prop) { obj = obj; prop = prop; return function () { ret...

Apache Tomcat

Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution Description : When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled...

WhatsApp Enum Spam

usage : ./exploit.py''' print banner class Exploit: def _ _init _ _(self,): print "" def damn(self,): print "" if _ _name _ _ == " _ _main _ _": Exploit()

ElasticSearch

This is an exploit for a recently disclosed remote code execution vulnerability in the ElasticSearch software. Basically, whatever "genius" came up with ElasticSearch decided that allowing remote, unauthenticated users to execute arbritary Java code vi...

cve-2022-42475

POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon Notes This is a quick and dirty POC that will probably not work anywhere unless you are extremely lucky. It is version dependent and contains some hardcoded offsets which will most likel...