Takeover Account OpenSSH
☆41Jun 30, 2024Updated last year
Alternatives and similar repositories for CVE-2023-38408
Users that are interested in CVE-2023-38408 are comparing it to the libraries listed below
Sorting:
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- PoC for CVE-2024-42327 / ZBX-25623☆18Dec 3, 2024Updated last year
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- OMLASP (Ideas Locas)☆21Nov 10, 2022Updated 3 years ago
- ☆12Aug 25, 2018Updated 7 years ago
- Apache forward request CVE☆16Apr 3, 2022Updated 3 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 11 years ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- ☆18Jul 9, 2020Updated 5 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- Projects from the Elektron Analog Rytm Mk2☆11Jan 11, 2026Updated 2 months ago
- ☆11Jan 18, 2020Updated 6 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆101Apr 7, 2022Updated 3 years ago
- ☆14Feb 7, 2024Updated 2 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- In Detail Methodology of How I perform Web Pentesting☆10Oct 18, 2025Updated 5 months ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Encryption which converts English characters to unicode characters that mimicking their appearance☆12Sep 17, 2017Updated 8 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- cheatsheets, dotfiles, scripts...☆18Dec 28, 2025Updated 2 months ago
- AI-based Ludus range configuration builder☆29May 6, 2025Updated 10 months ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Sep 8, 2021Updated 4 years ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- Remote Access Tool written in VBNET☆17Sep 8, 2020Updated 5 years ago
- 帮助苦逼溯源人员快速分析和追踪可疑IP与域名。☆20Jan 14, 2025Updated last year
- Random UI Fuzzer (Monkey-Fuzzer) for finding bugs in Windows Forms☆10Oct 27, 2019Updated 6 years ago
- Shellcode Spider of Exploit-DB☆11Oct 17, 2017Updated 8 years ago
- EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It…☆26Sep 6, 2025Updated 6 months ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆20May 7, 2023Updated 2 years ago
- A forensic system baselining, searching, and evidence collection tool☆19Sep 4, 2019Updated 6 years ago
- A bootkit to bypass Windows login (WIP)☆10Oct 25, 2023Updated 2 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Automates tasks for a mobile game, using color detection☆16Dec 13, 2018Updated 7 years ago
- CVE-2022-24990 TerraMaster TOS unauthenticated RCE via PHP Object Instantiation☆14Apr 25, 2022Updated 3 years ago
- ☆15Sep 17, 2022Updated 3 years ago
- A web security research tool for DOM testing☆24Feb 7, 2026Updated last month