☆28Aug 21, 2024Updated last year
Alternatives and similar repositories for CVE_Writeup
Users that are interested in CVE_Writeup are comparing it to the libraries listed below
Sorting:
- ☆27Jul 11, 2022Updated 3 years ago
- ☆23Jan 1, 2026Updated 2 months ago
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated 11 months ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- ☆11Sep 14, 2020Updated 5 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated 2 weeks ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- NeuralinkLLM is an open-source project dedicated to creating a robust interface for interacting and connecting your Brain via NeuralinkGP…☆12Sep 28, 2024Updated last year
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- ☆15Mar 12, 2025Updated 11 months ago
- Template for an Odoo project☆15Nov 6, 2025Updated 3 months ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆57May 1, 2023Updated 2 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- ApertaCookie is a PowerShell module that can extract and decrypt cookie data from the SQLite databases of several popular browsers.☆13Apr 3, 2022Updated 3 years ago
- ☆32Feb 13, 2026Updated 2 weeks ago
- ☆10Jan 8, 2018Updated 8 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- ☆36Dec 4, 2025Updated 2 months ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- In the spirit of #opendata, we publish our list (dangerous.domains) and a full change history here on GitHub, delayed by 6 hours. For liv…☆14Apr 19, 2025Updated 10 months ago
- CVE-2024-57727☆14Jan 17, 2025Updated last year
- ☆12Apr 15, 2022Updated 3 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- ☆15Apr 17, 2025Updated 10 months ago
- ☆15Aug 7, 2021Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 11, 2020Updated 6 years ago
- AFL, modified to support multi-CB challenge sets for CGC.☆19Aug 20, 2016Updated 9 years ago
- ☆16Jul 1, 2023Updated 2 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- CVE-2021-40444 Sample☆12Sep 10, 2021Updated 4 years ago
- The online version of Ciphey☆18Oct 11, 2023Updated 2 years ago
- Python tool to generate password permutations from keywords☆16Oct 6, 2023Updated 2 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago