☆221Jan 22, 2020Updated 6 years ago
Alternatives and similar repositories for sagemcom-fast-3890-exploit
Users that are interested in sagemcom-fast-3890-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Mar 30, 2020Updated 6 years ago
- Bootloader for bcm3384☆57May 24, 2017Updated 8 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool written in python for scraping firebase data☆43Apr 5, 2020Updated 6 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆624Jun 13, 2020Updated 5 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆30Nov 6, 2019Updated 6 years ago
- Certificate Export Utility☆26May 1, 2020Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆572Jan 22, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 6 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Tunnel SSH and other protocols over HTTP☆30Apr 22, 2017Updated 9 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Aug 27, 2019Updated 6 years ago
- A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.☆19Jun 29, 2017Updated 8 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Research on the Lenovo BIOS firmware.☆14Feb 28, 2021Updated 5 years ago
- Crack Dict☆11Oct 12, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- internet monitoring osint telegram bot for windows☆152Apr 9, 2023Updated 3 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆12Oct 5, 2022Updated 3 years ago
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 5 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 8 years ago
- The state of the art, modular, portable and easily extensible MITM framework in a Docker Container.☆14Dec 30, 2017Updated 8 years ago
- Fast defcon 26 quals pow solver☆24May 14, 2018Updated 8 years ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Nov 26, 2020Updated 5 years ago