CVE/Research Publications
☆25Jul 4, 2023Updated 2 years ago
Alternatives and similar repositories for publications
Users that are interested in publications are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 5 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- Automate creating resilient, disposable, secure and agile monitoring infrastructure for Blue Teams.☆24Oct 31, 2022Updated 3 years ago
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- CyberChef update scripts in PowerShell & Bash☆19Apr 22, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 3 years ago
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- ☆94May 14, 2022Updated 3 years ago
- ☆12May 6, 2021Updated 4 years ago
- ☆12May 13, 2024Updated last year
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Get Fine Grained Password Policy☆78Mar 13, 2026Updated last month
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- PCAP files are analysed using python. DNS delays, congestion window sizes, through put and good put are calculated.☆12Jul 1, 2015Updated 10 years ago
- Carbon Black TAU Excel 4 Macro Analysis☆44Feb 8, 2024Updated 2 years ago
- PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)☆71Oct 14, 2021Updated 4 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Material from ICS Village talk at DEFCON 25☆13Jul 30, 2018Updated 7 years ago
- Yara rules☆21Mar 27, 2023Updated 3 years ago
- Some useful test data or payloads☆26Oct 30, 2021Updated 4 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆10Nov 28, 2024Updated last year
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆63Jul 3, 2021Updated 4 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- Password Hunter in Active Directory☆199Jan 6, 2023Updated 3 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27May 25, 2022Updated 3 years ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- RedRays ABAP Code Analyzer: Open-Source Security Scanner for SAP ABAP☆13Jun 2, 2025Updated 11 months ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 3 months ago
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- Repository of various scripts related to Mobile PT. Copyrights and Licensing terms belong to respective owners.☆12Nov 4, 2019Updated 6 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- ☆26Jun 22, 2022Updated 3 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- Credential and sensitive information harvester for kubernetes environments.☆12Mar 2, 2021Updated 5 years ago