☆121Mar 18, 2026Updated 3 weeks ago
Alternatives and similar repositories for Vulnerabilidades
Users that are interested in Vulnerabilidades are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆96Updated this week
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 4 years ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- ☆153May 26, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆12Oct 1, 2019Updated 6 years ago
- ☆16May 20, 2022Updated 3 years ago
- Multithreaded exploit script for CVE-2022-36804 affecting BitBucket versions <8.3.1☆18Sep 19, 2022Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合☆10Jul 30, 2022Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆121Oct 24, 2024Updated last year
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆60Sep 2, 2021Updated 4 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,638Aug 6, 2022Updated 3 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- may the poc with you☆17May 6, 2022Updated 3 years ago
- ☆17Dec 14, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Poc of CVE-2022-22980☆32Jun 23, 2022Updated 3 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB☆25Feb 6, 2024Updated 2 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Sep 16, 2021Updated 4 years ago
- Detection Engineering Tools☆25Apr 7, 2026Updated last week
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆256Aug 31, 2022Updated 3 years ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆418May 29, 2024Updated last year
- Tools used for Pentesting☆22Apr 21, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This GitHub repository contains lessons for developing Microsoft Security CoPilot plugins☆20May 15, 2024Updated last year
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- A small executable to trick a user to authenticate using code matching MFA☆67Oct 6, 2023Updated 2 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- ☆414Nov 18, 2022Updated 3 years ago
- Living off the False Positive!☆42Apr 3, 2026Updated last week
- ☆105Jan 5, 2023Updated 3 years ago