DragonOS-Community / NovaShell
Shell of DragonOS
☆11Updated 2 months ago
Alternatives and similar repositories for NovaShell:
Users that are interested in NovaShell are comparing it to the libraries listed below
- A CLI and TUI(WIP) for chatGPT built with Rust. And offer a core crate for chatGPT app.☆22Updated this week
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Updated 10 months ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆9Updated 8 months ago
- 🌿 Package information to install via hysp package manager☆24Updated 8 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- A C# Tool to gather information about email breaches☆13Updated last year
- Spoofing the Windows UAC "verified" publisher :)☆13Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ASUS wifi router RCE vulnerability☆15Updated 5 months ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 8 months ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Updated 8 months ago
- Manjaro LPE☆34Updated last year
- USENIX 2023 Artifacts☆11Updated 2 years ago
- Exploit for CVE-2023-37903☆10Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 10 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 3 months ago
- Detect and remove the presence of canary tokens☆19Updated last year
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Updated last year
- OSINT Platform - Provides image analysis, digital footprints, video transcription and more. Retrieval Augmented Generation (RAG) capable …☆11Updated 8 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆40Updated last year
- A tool to embed files into images☆12Updated 4 years ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆11Updated 4 months ago
- Hardened your Windows OS against forensics analysis☆20Updated 3 months ago
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 8 months ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Updated 3 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated last year
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆21Updated 6 months ago