☆121Mar 18, 2026Updated this week
Alternatives and similar repositories for Vulnerabilidades
Users that are interested in Vulnerabilidades are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆96May 5, 2025Updated 10 months ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- ☆153May 26, 2022Updated 3 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- ☆16May 20, 2022Updated 3 years ago
- Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.☆148May 11, 2022Updated 3 years ago
- Multithreaded exploit script for CVE-2022-36804 affecting BitBucket versions <8.3.1☆18Sep 19, 2022Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合☆10Jul 30, 2022Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,634Aug 6, 2022Updated 3 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- may the poc with you☆17May 6, 2022Updated 3 years ago
- ☆17Dec 14, 2022Updated 3 years ago
- Poc of CVE-2022-22980☆32Jun 23, 2022Updated 3 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB☆25Feb 6, 2024Updated 2 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Sep 16, 2021Updated 4 years ago
- Detection Engineering Tools☆25Updated this week
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆256Aug 31, 2022Updated 3 years ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆417May 29, 2024Updated last year
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Tools used for Pentesting☆22Apr 21, 2023Updated 2 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- ☆413Nov 18, 2022Updated 3 years ago
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- ☆105Jan 5, 2023Updated 3 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,054Nov 9, 2024Updated last year
- ☆176Apr 9, 2025Updated 11 months ago