G-bdennour / HuaweiView external linksLinks
Some Of Huawei Routers Exploits
☆13Sep 1, 2016Updated 9 years ago
Alternatives and similar repositories for Huawei
Users that are interested in Huawei are comparing it to the libraries listed below
Sorting:
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- simple http(s) proxy with python based sqlmapapi wrapper☆10Jul 20, 2015Updated 10 years ago
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI☆40May 17, 2014Updated 11 years ago
- Simple python script to scan some weak things.☆14Nov 2, 2015Updated 10 years ago
- Quick binary search for NTLM hash dataset☆18Jan 31, 2019Updated 7 years ago
- A CUI Struts2 Vulnerability Exploit☆16Jul 29, 2016Updated 9 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Eir is a static vulnerability analysis tool for PHP applications written in C#☆20Oct 1, 2017Updated 8 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Aug 2, 2016Updated 9 years ago
- Graduation Project.☆19Jul 24, 2015Updated 10 years ago
- Proof-of-Concept code for exploits☆82May 5, 2016Updated 9 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Jul 10, 2017Updated 8 years ago
- discuz-plugin-scan☆21Sep 23, 2015Updated 10 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Apr 25, 2019Updated 6 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Apr 19, 2017Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- ☆32Jul 18, 2014Updated 11 years ago
- 修改htcap的数据库为mysql☆24Jul 9, 2017Updated 8 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 2 months ago
- Stupid MQTT Brute Forcer☆32Jul 27, 2017Updated 8 years ago
- tundeep☆42Aug 2, 2019Updated 6 years ago
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago
- 山东大学代Go跑腿项目☆10Mar 10, 2018Updated 7 years ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆16Nov 14, 2025Updated 2 months ago
- Docker-Remote-API-Exploit☆31Jan 5, 2018Updated 8 years ago
- 西安电子科技大学软件学院Web工程Project☆13Jul 26, 2018Updated 7 years ago
- Documentation and proofs of concept on the polyglot file PEDICOM (PE executable + DICOM)☆38Apr 10, 2019Updated 6 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- ☆10Mar 7, 2020Updated 5 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- ☆26Nov 9, 2014Updated 11 years ago
- A bot that search for content in Wikipedia Api☆14May 17, 2019Updated 6 years ago
- 鉴穹日志安全分析系统☆18Sep 7, 2025Updated 5 months ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- Scripts to generate a flashable ZIP file with the latest Fairphone modem firmware☆14Aug 13, 2022Updated 3 years ago
- ☆10Jun 1, 2014Updated 11 years ago