Aurum2008 / CVE2020-0796View external linksLinks
Exploit for win10 SMB3.1
☆18Apr 5, 2020Updated 5 years ago
Alternatives and similar repositories for CVE2020-0796
Users that are interested in CVE2020-0796 are comparing it to the libraries listed below
Sorting:
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 5 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Oct 1, 2016Updated 9 years ago
- ☆25Mar 21, 2020Updated 5 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 8 years ago
- Windows Reverse TCP backdoor☆29Apr 28, 2019Updated 6 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 7 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Oct 17, 2019Updated 6 years ago
- Provides a way to install Microsoft Store Apps via an RMM☆10Jun 5, 2025Updated 8 months ago
- Reverts all changes made to Windows 10 (including disabled Cortana), caused by "Destroy Windows Spying" Tool [DWS_Lite.exe] to default st…☆10Dec 15, 2017Updated 8 years ago
- HadoopLink是基于Hadoop及BaseMR进一步封装而来的工作链框架。该框架省去了您生成Job,JobControl,ContrlledJob的繁杂重复代码。同时您可以非常便捷的通过注释设置MapReduce任务之间的依赖关系。HadoopLink支持多个任务链并…☆11Sep 2, 2019Updated 6 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Scanning in the middlelayer, v2☆10Updated this week
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- ☆11Nov 22, 2021Updated 4 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Framework for exploiting local vulnerabilities☆84Nov 18, 2023Updated 2 years ago
- OSWE Preparation☆38May 28, 2019Updated 6 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆44Sep 18, 2019Updated 6 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Oct 13, 2020Updated 5 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Repo for MGraph project☆13Jan 10, 2026Updated last month
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Open Source Intelligence - Buscando informações sobre infraestruturas☆10Feb 13, 2019Updated 7 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- A MCP (Model Context Protocol) client that uses Google Gemini AI models for intelligent tool usage and conversation handling. Tested wor …☆19May 27, 2025Updated 8 months ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 5 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- CIDR to IP List Tool☆14Mar 12, 2016Updated 9 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago