cervantes
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
Our great sponsors
cervantes | CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera | |
---|---|---|
1 | 7 | |
250 | 321 | |
2.4% | - | |
7.1 | 0.0 | |
about 1 month ago | over 1 year ago | |
C# | HTML | |
Apache License 2.0 | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cervantes
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
- CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: ๐ฉ ๐ค๐ป [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
- GitHub - Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: ๐ฉ ๐ค๐ป [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
- ๐ฉ ๐ค๐ป [P1-Reward:$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
What are some alternatives?
red_team_attack_lab - Red Team Attack Lab for TTP testing & research
cve - Gather and update all available and newest CVEs with their PoC.
evillimiter-windows - Tool that limits bandwidth of devices on the same network without access.
black-hat-rust - Applied offensive security with Rust - https://kerkour.com/black-hat-rust
faraday - Open Source Vulnerability Management Platform
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
THC-Archive - All releases of the security research group (a.k.a. hackers) The Hacker's Choice
AlanFramework - A C2 post-exploitation framework
awesome-list-of-secrets-in-environment-variables - ๐ฆ๐ Awesome list of secrets in environment variables ๐ฅ๏ธ
Penetration-Testing-Tools - A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
CVE-2021-44228-PoC-log4j-bypass-words - ๐ฑโ๐ป โ๏ธ ๐คฌ CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks