Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
-
Updated
May 2, 2022 - C
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
I found a vulnerability in supbrocess module, this vulnerability can be exploited to exploit a RCE (Remote Code Execution)
"Hack the Matrix" ZZT arbitrary code execution exploit and demo
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
A collection of my security advisories for the Vim editor
Introduction to information security, exploiting a vulnerable ISO.
Sandbox for multi-process applications for unprivileged users on Linux
RunMyPython is a web-based Python execution module built using the Flask framework. It allows secure execution of arbitrary Python code directly via web interface and preview of executed results.
A way to export your Pokémon from Red and Blue, without the need for external hardware.
CVE-2004-1769 cPanel Resetpass Remote Command Execution
This repository contains the exploits to Linux VM binaries provided by Exploits1 course by opensecuritytraining
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
A security specification on Nuclear Ad Bombs, and why operating systems shouldn't have embedded ads.
Arbitrary code execution server using Docker.
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
A demo of a remote code execution engine using Tork
The online-with-security project is a small cyber security manuscript for the prevention of computer attacks.
The man-in-the-middle toolkit
A repository dedicated to terminal escape injections.
A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine" as per CVE-2021-32471 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32471)
Add a description, image, and links to the arbitrary-code-execution topic page so that developers can more easily learn about it.
To associate your repository with the arbitrary-code-execution topic, visit your repo's landing page and select "manage topics."