The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
-
Updated
May 20, 2024 - C#
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States' National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Hourly updated database of exploit and exploitation reports
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
The Common Vulnerabilities Exposures (CVE) Database
Malicious IP source.
The EXCLUSIVE Collection of 36,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.
📡 PoC auto collect from GitHub.
Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack, Telegram, Discord, PushOver and/or MS Teams.
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
All published CVE and their recent changes, ready to be used by humans and machines