☆62Jan 22, 2026Updated last month
Alternatives and similar repositories for CVE-2026-24061-POC
Users that are interested in CVE-2026-24061-POC are comparing it to the libraries listed below
Sorting:
- CVE-2025-3248 Langflow RCE Exploit☆16Jun 17, 2025Updated 8 months ago
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆52Oct 16, 2025Updated 4 months ago
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆67May 31, 2025Updated 9 months ago
- ☆13Aug 5, 2025Updated 7 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆35Jan 18, 2026Updated last month
- ☆10Aug 26, 2016Updated 9 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆10Mar 3, 2024Updated 2 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 3 months ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated last month
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 5 months ago
- Tiny Windows executable that outputs version information about the OS.☆11Feb 1, 2026Updated last month
- Automate Brew, MacOS, and NPM Packages. Fork and customize!☆11Mar 11, 2025Updated 11 months ago
- This project offers two Flask applications that utilize ImageAI's image prediction algorithms and object detection models. These apps ena…☆15Jun 26, 2024Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- CVE-2025-33053 Proof Of Concept (PoC)☆63Jun 17, 2025Updated 8 months ago
- Monitoring Windows processes tool for malware analysis. Inspired by Regshot tool.☆13Jun 24, 2024Updated last year
- posting example☆15May 11, 2020Updated 5 years ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated last month
- A bash script that can scan a target host or a list of target hosts looking for open/closed ports using netcat or telnet.☆13Feb 11, 2023Updated 3 years ago
- 🪲 Bug Buster, a bug bounty platform powered by Cartesi Rollups☆13Mar 20, 2025Updated 11 months ago
- CPU/Battery power management tool for Linux systems☆32Mar 1, 2026Updated last week
- ☆11Feb 13, 2024Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- A Advanced Independent Browser Of Ethical Hackers and Cybersecurity Researchers☆24Apr 14, 2025Updated 10 months ago
- Deploy IRC server using Docker☆13Dec 15, 2023Updated 2 years ago
- HTB recon tool to simplify part of the enumeration process☆13May 14, 2025Updated 9 months ago
- HTTP reverse proxy to access files hosted on a FTP server☆12Dec 3, 2025Updated 3 months ago
- Prompting and research workflow for lecture building☆16Sep 5, 2025Updated 6 months ago
- ☆11Jul 20, 2024Updated last year
- 🚕 Simple telephone taxi management☆11Nov 15, 2018Updated 7 years ago
- DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incom…☆18Feb 25, 2026Updated last week
- Making Maps for Investigators☆14Feb 13, 2026Updated 3 weeks ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- Collection of various WINAPI tricks / features used or abused by Malware☆13Mar 28, 2022Updated 3 years ago
- Docker containers for yunohost☆11Aug 2, 2015Updated 10 years ago
- Gopher textboard☆12Jun 29, 2020Updated 5 years ago