☆121Mar 18, 2026Updated last month
Alternatives and similar repositories for Vulnerabilidades
Users that are interested in Vulnerabilidades are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆96Apr 8, 2026Updated 3 weeks ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- ☆16May 20, 2022Updated 3 years ago
- Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.☆148May 11, 2022Updated 3 years ago
- Multithreaded exploit script for CVE-2022-36804 affecting BitBucket versions <8.3.1☆18Sep 19, 2022Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合☆10Jul 30, 2022Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆121Oct 24, 2024Updated last year
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆60Sep 2, 2021Updated 4 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 5 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,642Aug 6, 2022Updated 3 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- may the poc with you☆17May 6, 2022Updated 3 years ago
- ☆17Dec 14, 2022Updated 3 years ago
- Poc of CVE-2022-22980☆32Jun 23, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB☆25Feb 6, 2024Updated 2 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Sep 16, 2021Updated 4 years ago
- Detection Engineering Tools☆26Updated this week
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆255Aug 31, 2022Updated 3 years ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆422May 29, 2024Updated last year
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Tools used for Pentesting☆22Apr 21, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 3 years ago
- ☆414Nov 18, 2022Updated 3 years ago
- ☆105Jan 5, 2023Updated 3 years ago
- Living off the False Positive!☆42Apr 3, 2026Updated last month
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,116Nov 9, 2024Updated last year