mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-12-11 09:04:25 -05:00
Add Exploits section
This commit is contained in:
parent
4ae9ec582b
commit
b74eaf5708
36
README.md
36
README.md
@ -11,6 +11,7 @@ My curated list of awesome links, resources and tools
|
|||||||
- [AWS Security](#aws-security)
|
- [AWS Security](#aws-security)
|
||||||
- [Binary Analysis](#binary-analysis)
|
- [Binary Analysis](#binary-analysis)
|
||||||
- [Digital Forensics and Incident Response](#digital-forensics-and-incident-response)
|
- [Digital Forensics and Incident Response](#digital-forensics-and-incident-response)
|
||||||
|
- [Exploits](#exploits)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -142,3 +143,38 @@ My curated list of awesome links, resources and tools
|
|||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
### Exploits
|
||||||
|
|
||||||
|
*Interesting exploits. For research purpose only*
|
||||||
|
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/FriendsOfPHP/security-advisories">FriendsOfPHP/security-advisories</a></td>
|
||||||
|
<td>The PHP Security Advisories Database references known security vulnerabilities in various PHP projects and libraries. This database must not serve as the primary source of information for security issues, it is not authoritative for any referenced software, but it allows to centralize information for convenience and easy consumption.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/IOActive/I-know-where-your-page-lives">IOActive/I-know-where-your-page-lives</a></td>
|
||||||
|
<td><b>CVE-2016-7255</b> The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/ojasookert/CVE-2017-0785">ojasookert/CVE-2017-0785</a></td>
|
||||||
|
<td><b>CVE-2017-0785</b>: A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146698.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/ScottyBauer/Android_Kernel_CVE_POCs">ScottyBauer/Android_Kernel_CVE_POCs</a></td>
|
||||||
|
<td>A list of my CVE's with POCs</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/spencerdodd/kernelpop">spencerdodd/kernelpop</a></td>
|
||||||
|
<td>Kernel privilege escalation enumeration and exploitation framework</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/victims/victims-cve-db">victims/victims-cve-db</a></td>
|
||||||
|
<td>This database contains information regarding CVE(s) that affect various language modules. We currently store version information corresponding to respective modules as understood by select sources.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><a href="https://github.com/xairy/kernel-exploits"xairy/kernel-exploits></a></td>
|
||||||
|
<td>A bunch of proof-of-concept exploits for the Linux kernel</td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
Loading…
Reference in New Issue
Block a user