Repository navigation

#

exploiting-vulnerabilities

JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool

Python
2458
5 年前

Fastjson vulnerability quickly exploits the framework(fastjson漏洞快速利用框架)

Java
1322
2 年前

A collection of my quick and dirty scripts for vulnerability POC and detections

Lua
76
5 年前

Challenges and vulnerabilities exploitation.

Python
59
4 年前

In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values ​​and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .

HTML
14
2 年前

In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values ​​and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .

HTML
11
2 年前

Code Portfolio -- Collection of Interesting CS and ECE Projects in different languages (C, C++, Python, CPU & GPU Parallel Paradigms, MATLAB, and VHDL) and target hardware with technical reports, and my Vim Config

C
7
4 年前

Damn Vulnerable Tiny Web Server - A deliberately insecure webserver for learning purpose

C
6
3 年前

Hack your GitHub account in just a few minutes using my custom python installer!

Python
0
7 年前