Exploit
Browse 6 cybersecurity tools tagged with "Exploit"
ExploitDB
Penetration Testing
ExploitDB on SecurityListing: A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
Raven Runtime Prevention
Software Composition Analysis
Raven Runtime Prevention on SecurityListing: Runtime protection preventing supply-chain attacks & exploits via library-level policies
AttackerKB
Vulnerability Assessment
AttackerKB on SecurityListing: A platform providing an activity feed on exploited vulnerabilities.
Abusing Exported Functions
Offensive Security
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement on SecurityListing: A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement
checkra1n
Offensive Security
checkra1n on SecurityListing: Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Understanding Docker container
Container Security
Understanding Docker container escapes on SecurityListing: Exploit that launches a process on the host from within a Docker container run with the --privileged flag by abusing the Linux cgroup v1 “notification on release” feature.