Exploit for win10 SMB3.1
☆18Apr 5, 2020Updated 5 years ago
Alternatives and similar repositories for CVE2020-0796
Users that are interested in CVE2020-0796 are comparing it to the libraries listed below
Sorting:
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Jun 24, 2020Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Oct 1, 2016Updated 9 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- ☆25Mar 21, 2020Updated 5 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 8 years ago
- ☆27Apr 9, 2022Updated 3 years ago
- Windows Reverse TCP backdoor☆28Apr 28, 2019Updated 6 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 8 years ago
- HadoopLink是基于Hadoop及BaseMR进一步封装而来的工作链框架。该框架省去了您生成Job,JobControl,ContrlledJob的繁杂重复代码。同时您可以非常便捷的通过注释设置MapReduce任务之间的依赖关系。HadoopLink支持多个任务链并…☆11Sep 2, 2019Updated 6 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated 2 months ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- ☆11Nov 22, 2021Updated 4 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- OSWE Preparation☆38May 28, 2019Updated 6 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆44Sep 18, 2019Updated 6 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- ☆11Feb 6, 2019Updated 7 years ago
- cve-2025-24813验证脚本☆11Mar 14, 2025Updated 11 months ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Just a vault template to help someone on the certificate.☆12Sep 3, 2025Updated 6 months ago
- It's only hitting vulnerable path in termdd.sys!!! NOT DOS☆12May 19, 2019Updated 6 years ago
- UniFi 5 Controller for Raspberry Pi☆13Jan 31, 2018Updated 8 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 9 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Open Source Intelligence - Buscando informações sobre infraestruturas☆10Feb 13, 2019Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago