☆15Nov 4, 2020Updated 5 years ago
Alternatives and similar repositories for git-lfs-RCE-exploit-CVE-2020-27955-Go
Users that are interested in git-lfs-RCE-exploit-CVE-2020-27955-Go are comparing it to the libraries listed below
Sorting:
- TideRadar工业互联网安全监测平台☆11Aug 3, 2019Updated 6 years ago
- ☆65Dec 9, 2020Updated 5 years ago
- Retrieves information about a given domain from the Google Transparency Report : https://transparencyreport.google.com/https/certificates☆20Dec 15, 2021Updated 4 years ago
- CVE-2020-17008 splWOW64 Elevation of Privilege☆46Dec 24, 2020Updated 5 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- ☆23Mar 29, 2022Updated 3 years ago
- web sensitive information recognition module☆20Nov 27, 2025Updated 3 months ago
- ☆25Feb 6, 2024Updated 2 years ago
- A simple script for quickly mining sensitive information in binary files.☆30Dec 1, 2020Updated 5 years ago
- Exploit for WebSocket Vulnerability in Apache Tomcat☆169Nov 2, 2020Updated 5 years ago
- Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.☆33Jul 13, 2022Updated 3 years ago
- ☆68Oct 10, 2023Updated 2 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Oct 21, 2020Updated 5 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- CVE-2021-40346 integer overflow enables http smuggling☆32Sep 28, 2021Updated 4 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Dec 21, 2020Updated 5 years ago
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- ☆73Feb 28, 2024Updated 2 years ago
- A HTTP PoC Endpoint for cve-2020-5260 which can be deployed to Heroku☆38Apr 16, 2020Updated 5 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Oct 30, 2024Updated last year
- Spring Cloud SnakeYAML 反序列化一键注入cmdshell和reGeorg☆135Sep 24, 2020Updated 5 years ago
- ☆39Feb 10, 2021Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- PoC CVE-2020-6308☆36Dec 29, 2020Updated 5 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Jul 27, 2021Updated 4 years ago
- ☆37May 15, 2022Updated 3 years ago
- 整理每个流行botnet家族的专杀脚本、靶机环境、检测规则、病毒样本、病毒原理图☆76Mar 29, 2021Updated 4 years ago
- ☆43Jul 6, 2022Updated 3 years ago
- ☆45Apr 12, 2022Updated 3 years ago
- ☆45Jul 19, 2023Updated 2 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- baseband security research☆84Apr 7, 2021Updated 4 years ago
- ☆37May 8, 2022Updated 3 years ago
- ☆10Jun 5, 2023Updated 2 years ago
- SUNBURST DGA decoder☆11Dec 23, 2020Updated 5 years ago
- ☆11Sep 5, 2019Updated 6 years ago
- Detect code obfuscation through text classification in the detection process.☆46Feb 7, 2024Updated 2 years ago