- France, Vaucluse
-
10:13
(UTC +02:00) - https://www.pentesterlab.com/profile/FrancoisCapon
Pinned Loading
-
LoginToASqlite3DatabaseWithoutCredentialsWithAdminer
LoginToASqlite3DatabaseWithoutCredentialsWithAdminer Public✔️ An Adminer plugin to use SQLite databases without credentials (no username and no password)
-
TurtwigRidesDirtyCOW
TurtwigRidesDirtyCOW Public🐮 A new writing of Dirty COW "Pokemon" exploit that is generic, stealthy and fast. 🐢
C
-
Base64SteganographyTools
Base64SteganographyTools Public🔎 Base64 Steganography Tools (in Bash) 📜
Shell 5
-
TheBulletNumberFontOfParisMetro
TheBulletNumberFontOfParisMetro Public🚇 The Bullet Number Font of Paris Metro with a ligature for the numbers 10 to 18. 🇫🇷
-
CVE-2022-39224 POC (ARR-PM 0.0.11) i...
CVE-2022-39224 POC (ARR-PM 0.0.11) in a Docker Container 1# CVE-2022-39224 POC in a Docker Container
23I don't found an example of POC for this CVE of [ruby-arr-pm 0.0.11](https://github.com/jordansissel/ruby-arr-pm), so I build one using a Docker container.
4* [Arbitrary shell execution when extracting or listing files contained in a malicious rpm. (CVE-2022-39224)](https://github.com/jordansissel/ruby-arr-pm/security/advisories/GHSA-88cv-mj24-8w3q)
5* [PentesterLab > CVE-2022-39224](https://pentesterlab.com/exercises/cve-2022-39224)
-
Extracts embedded fonts from a Micro...
Extracts embedded fonts from a Microsoft Word Document (.docx) 1#!/usr/bin/env python3
23# Standard Library
4import zipfile, xml.etree.ElementTree, shutil, os, sys, pathlib
5
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.