CylanceVulnResearch / disclosuresView external linksLinks
☆16Mar 31, 2017Updated 8 years ago
Alternatives and similar repositories for disclosures
Users that are interested in disclosures are comparing it to the libraries listed below
Sorting:
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- A warehouse for your malware☆20Feb 25, 2013Updated 12 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- API to use Cymru services☆27Dec 6, 2013Updated 12 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Repository for Tor's DNS-related issues.☆17Dec 19, 2016Updated 9 years ago
- F.Security Framwork☆20Jul 10, 2016Updated 9 years ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 6 years ago
- A phishing tool to set a soft-AP on raspberryPi, filter the Http request and DNS query from the client and redirect the connection to a f…☆17Mar 4, 2018Updated 7 years ago
- Viper is a brute-force password cracker.☆24Feb 10, 2016Updated 10 years ago
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24May 15, 2017Updated 8 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Sep 26, 2023Updated 2 years ago
- ☆23Dec 16, 2015Updated 10 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack☆52Jan 14, 2019Updated 7 years ago
- Slides and very basic examples☆112May 17, 2017Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- Process heap analysis framework - Windows/Linux - record type inference and forensics☆94Jul 26, 2017Updated 8 years ago
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 8 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Aplikasi HALAL MUI dengan express☆10Feb 11, 2017Updated 9 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 4 years ago
- Getting BlindElephant into a working state, and updating the plugin files☆80Sep 2, 2020Updated 5 years ago
- My python3 implementation of a Forward Shell☆36Jan 25, 2019Updated 7 years ago