GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.
☆27Aug 4, 2022Updated 3 years ago
Alternatives and similar repositories for GLUFS
Users that are interested in GLUFS are comparing it to the libraries listed below
Sorting:
- ☆14Feb 25, 2022Updated 4 years ago
- CVE-2021-32099☆22Jan 12, 2022Updated 4 years ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆26Nov 23, 2025Updated 3 months ago
- Laravel RCE exploit. CVE-2018-15133☆34Mar 22, 2022Updated 3 years ago
- Minecraft mod that allow you to add an unlimited amount of your music as music discs.☆10Sep 6, 2025Updated 5 months ago
- ☆41Apr 5, 2025Updated 10 months ago
- A tiny runtime hot patch tool for JAVA☆14Dec 22, 2024Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- ☆95Oct 19, 2022Updated 3 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Original set of icons on existing game consoles and some variants.☆14Nov 30, 2021Updated 4 years ago
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- ☆10Feb 7, 2020Updated 6 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- 一个可以全端口捕获流量的简易蜜罐 tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆13Aug 3, 2022Updated 3 years ago
- Get the IP adresses of Bittorrent Peers☆13Oct 14, 2016Updated 9 years ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 4 months ago
- Awesome deals on Black Friday: Apps, SaaS, Books, Courses, etc.☆11Nov 14, 2023Updated 2 years ago
- Import custom queries into BloodHound CE from a legacy BloodHound JSON file.☆10Mar 22, 2024Updated last year
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- ☆11Apr 2, 2022Updated 3 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- If these strings are in your code, you might have a problem!☆51Feb 13, 2026Updated 2 weeks ago
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆11May 11, 2024Updated last year
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago