CVE-2024-21413 PoC for THM Lab
☆230Mar 13, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2024-21413
Users that are interested in CVE-2024-21413 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆92Feb 14, 2024Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC☆17Feb 16, 2024Updated 2 years ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆760Feb 19, 2024Updated 2 years ago
- Vagrant provisioning scripts to create a simulated network environment for tabletop exercises☆43Jul 28, 2022Updated 3 years ago
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,578Jan 12, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Dec 28, 2024Updated last year
- Lightweight, customizable enumeration script to aid in time-saving when participating in hacking labs or OSCP exam.☆32Feb 18, 2026Updated last month
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,315Mar 7, 2024Updated 2 years ago
- ☆13Nov 29, 2024Updated last year
- Single-file PHP shell☆2,748Aug 11, 2025Updated 7 months ago
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆22Apr 23, 2025Updated 11 months ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- DeNiSe is a proof of concept for tunneling TCP over DNS in Python☆38Dec 17, 2021Updated 4 years ago
- ☆26Sep 1, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- EvilPunch is a reverse proxy framework intended for authorized red teaming, adversary / Phishing emulation, and educational security rese…☆18Nov 3, 2025Updated 5 months ago
- Decrypts blowfish (w. static key) encrypted hMail database password.☆15Feb 21, 2018Updated 8 years ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- List of the links to the docs for different services, which explain using of advanced search operators☆2,096Feb 22, 2025Updated last year
- MBC content in markdown☆537Jun 12, 2025Updated 9 months ago
- A curated collection of amazing software, libraries, documents, books, resources, and other cool security-related content.☆14Nov 13, 2024Updated last year
- ☆10May 29, 2023Updated 2 years ago
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆31Jul 11, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Jun 18, 2023Updated 2 years ago
- ☆25Aug 19, 2024Updated last year
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Jun 7, 2024Updated last year
- ☆24Apr 23, 2024Updated last year
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Dec 26, 2024Updated last year
- Personal portfolio- The site showcases his projects, skills, and contact information, emphasizing his expertise in front-end development …☆19Mar 21, 2026Updated 2 weeks ago
- Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本☆19Apr 1, 2025Updated last year
- repo for the ctf challenges☆14Apr 20, 2024Updated last year
- ☆18Aug 15, 2025Updated 7 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆53Jan 11, 2025Updated last year
- Python script to decrypt passwords stored by mRemoteNG☆177Jul 6, 2023Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Port DOSBox 0.74-3 for KolibriOS☆15Jan 14, 2024Updated 2 years ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆265Jul 2, 2025Updated 9 months ago
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆68Oct 15, 2019Updated 6 years ago
- Low-level raw PNG reader for JavaScript with access to raw bitmap, chunks etc.☆14Apr 23, 2018Updated 7 years ago