Hakai Security
We discover security flaws that your team would never have thought of.
Pinned Loading
Repositories
Showing 10 of 10 repositories
- IngressNightmare-PoC Public
This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).
hakaioffsec/IngressNightmare-PoC’s past year of commit activity - jwt-vulnerabilities-lab Public
hakaioffsec/jwt-vulnerabilities-lab’s past year of commit activity - CVE-2024-21338 Public
Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.
hakaioffsec/CVE-2024-21338’s past year of commit activity - Reconnaissance-like-a-cyber-scout Public
Enumeration is an essential phase in the hacking process. It involves gathering information about a specific target, such as networks, systems, applications, or devices, to identify potential vulnerabilities that can be exploited. This phase is crucial for understanding the attack surface and discovering weaknesses in the systems.
hakaioffsec/Reconnaissance-like-a-cyber-scout’s past year of commit activity - InfoIpFinder Public
hakaioffsec/InfoIpFinder’s past year of commit activity