-
-
muck
... other than a single, reverse-chronological-order, list of entries
* A large, rabid fan base ... of people looking to exploit security holes in the software
* Clumsy or bolted on solutions to handle attached files or metadata
Proposed Solution
...
-
uoproxy
... multi client operation
- block spy packets
- circumventing a shard's login server (most freeshards are insecure!)
- easy exploit development (if you know C)
Getting uoproxy
---------------
You can download uoproxy on the home page:
http://max. ...
-
mt-plugin-storefront
... static content cannot be customized on a user-by-user basis. While this *can* be true, it is not universally true. We exploit this fact in our
implementation strategy for making premium content available to readers.
So, to be more precise, in Movable ...
-
scala-reflectionator
Scala type-safe reflection helpers
# Scala Reflectionator #
This is a set of utility classes to exploit Scala's mostly undocumented scala.reflect.Code facility
to extract metadata from literal code snippets.
-
php-saml
... to 3.0.4 (CVE-2019-3465), but php-saml was not directly affected since it implements additional checks that prevent to exploit that vulnerability.
Version 2.17.0 sets strict mode active by default
Update php-saml to 2.15.0, this version includes a ...
-
iREB-2.0
... from xpwn.
This is iREB. It uses the usb control msg exploit from 3.1.2 + Uses the limera1n/steaks4uce exploit.
-----------------------
It uses Syringe created by The Chronic Dev-Team/Joshua Hill.
It is released under the GPL v3 ...
-
ibex
... particular iBoot is vulnerable
to the usb_control_msg(0x21, 2) exploit. Otherwise, we would have to have
a pwned ... => 0x38 (gets executed, eventually)
Load Address: 0x41000000
USB Exploit: copies 0x2000 bytes from 0x41000000 to 0x0
Commands: ...
-
muster
... this data efficiently, clustering algorithms
that move as little data as possible are required. In Muster, we exploit
sampled clustering algorithms to realize this efficiency.
The parallel algorithms in Muster are implemented using the Message ...
-
github_bot
Small web-scraper bot to get list of people with their email
Github Bot
----------
Useful bot to exploit the github search box in a large scale and send email to
the users.
Ethical Concerns
++++++++++++++++
Please do not use that bot for spam, or you ...
-
MobiMS
... restart the script to handle a further connection.
User and password are fixed and are guancio/guancio.
Currently MobiMS exploit Bluetooth for desktop/phone communications. Allowing
a standard mail client to connect to your MobiMS requires a proxy that
...
-