CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
THC-Archive
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera | THC-Archive | |
---|---|---|
7 | 5 | |
321 | 653 | |
- | 0.5% | |
0.0 | 2.5 | |
over 1 year ago | 11 months ago | |
HTML | HTML | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
- CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: π© π€π» [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
- GitHub - Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: π© π€π» [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
- π© π€π» [P1-Reward:$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
THC-Archive
-
Why Isn't a Timer Capable of Preventing Brute Force
It is possible to brute force logins online, using something like Hydra, but many site already lockout an IP address after X failed login attempts.
-
Crashes when running βgit cloneβ
git clone https://github.com/vanhauser-thc/thc-hydra
-
How can I find the credentials in this situation.
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2022-05-20 07:41:34
- Why does metasploit find the password but hydra doesn't?
-
Anonymizing UNIX Systems (van Hauser / THC)
Source: https://github.com/hackerschoice/THC-Archive/blob/master/Papers/anonymous-unix.html
What are some alternatives?
cve - Gather and update all available and newest CVEs with their PoC.
Ultimate-Guitar-Hack - The first tool to download any Guitar Pro file, including 'Official' from Ultimate Guitar
black-hat-rust - Applied offensive security with Rust - https://kerkour.com/black-hat-rust
p8-smartwatch-hacking - P8 Smartwatch (Colmi) hacking
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
ESPKey - Wiegand data logger, replay device and micro door-controller
cervantes - Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive management tool, streamlining the organization of projects, clients, vulnerabilities, and reports in a single, centralized location.
Carilana - Scripts developed for the LiquidBounce script api.
awesome-list-of-secrets-in-environment-variables - π¦π Awesome list of secrets in environment variables π₯οΈ
habu - Hacking Toolkit
CVE-2021-44228-PoC-log4j-bypass-words - π±βπ» βοΈ π€¬ CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
hackingthe.cloud - An encyclopedia for offensive and defensive security knowledge in cloud native technologies.