cve
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
cve | CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera | |
---|---|---|
13 | 7 | |
6,062 | 321 | |
1.3% | - | |
9.7 | 0.0 | |
7 days ago | over 1 year ago | |
HTML | HTML | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cve
-
Strange subdomain found during nmap scan
Did you try using https://trickest.com?
- A folosit cineva pΓ’nΔ acum Trickest?
- CVE POCs
- windows exploit dev ctfs
- Asking for Advice - How can we find Linux N-days to develop exploits for?
-
[Help] I'm looking for a downloadable list of all CVEs including vulnerability
Anyhow, these project might help: - https://cve-search.github.io/cve-search/ - https://github.com/trickest/cve/ - https://github.com/ChrisIvie/offline-cve - https://avleonov.com/2017/10/03/downloading-and-analyzing-nvd-cve-feed/ - opencve.io
- Awesome Hacker Search Engines
-
PoC available for CVE's
https://github.com/trickest/cve this repo might have what you want
- A constantly updated collection of almost every publicly available CVE PoC
CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
- CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: π© π€π» [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
- GitHub - Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: π© π€π» [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
- π© π€π» [P1-Reward:$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
What are some alternatives?
nuclei-templates - Community curated list of templates for the nuclei engine to find security vulnerabilities.
black-hat-rust - Applied offensive security with Rust - https://kerkour.com/black-hat-rust
CVE-2021-4034 - PoC for PwnKit: Local Privilege Escalation Vulnerability in polkitβs pkexec (CVE-2021-4034)
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
cervantes - Cervantes is an open-source, collaborative platform designed specifically for pentesters and red teams. It serves as a comprehensive management tool, streamlining the organization of projects, clients, vulnerabilities, and reports in a single, centralized location.
A-Red-Teamer-diaries - RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
THC-Archive - All releases of the security research group (a.k.a. hackers) The Hacker's Choice
unikernels - State of the art for unikernels
awesome-list-of-secrets-in-environment-variables - π¦π Awesome list of secrets in environment variables π₯οΈ
fleet - A flexible control server for osquery fleets
CVE-2021-44228-PoC-log4j-bypass-words - π±βπ» βοΈ π€¬ CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks