Marco Ivaldi<p>I'd like to share some of my projects that are hosted on <span class="h-card" translate="no"><a href="https://infosec.exchange/@github" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>github</span></a></span>. Let's start with my public <a href="https://infosec.exchange/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> that span more than two decades of <a href="https://infosec.exchange/tags/pwning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pwning</span></a>.</p><p><a href="https://github.com/0xdea/exploits" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/0xdea/exploits</span><span class="invisible"></span></a></p><p>"You can't argue with a root shell." -- Felix "FX" Lindner</p><p>Probably the most known is raptor_udf.c that targets <a href="https://infosec.exchange/tags/MySQL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MySQL</span></a> (those of you who solved the <span class="h-card" translate="no"><a href="https://infosec.exchange/@offsec" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>offsec</span></a></span> <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> training labs should recognize it).</p><p>My favorite is still raptor_rlogin.c, a glorious <a href="https://infosec.exchange/tags/Solaris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Solaris</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> from the early 2000s. Take your pick!</p>