Before Mythos ruins vulnerability research for everyone. Here is a list all the CVE's I found (with some exploits).

Before Mythos ruins vulnerability research for everyone. Here is a list all the CVE's I found (with some exploits).

I didn't think I will share my CVE's and definitly not some of their exploits.
But the recent advancment in AI vulnerability research really ruined the fun of this practice.
So F` it. Here is a list of the CVE's I found in the last 12 months. The list contains:
Technical deep dives, exploits, Fuzzing session walkthoughs, Linux Kernel CVE's, low moderate & high CVE's, and more.
I only focused on Open Source code as I hate reverse engineering.

There are more CVE's on the way, but boy some maintainers move slow. I will add them to the list once they are public.
Enjoy! give me feedback and give the repo a star.

Have a great week

submitted by /u/More_Implement1639
[link] [comments]


from hacking: security in practice https://ift.tt/iwdoUVS

Comments