A simple scanner for identifying vulnerable cups-browsed instances on your network
☆66Oct 7, 2024Updated last year
Alternatives and similar repositories for CVE-2024-47176-Scanner
Users that are interested in CVE-2024-47176-Scanner are comparing it to the libraries listed below
Sorting:
- ☆42Sep 30, 2024Updated last year
- API for Asset Service☆15Aug 15, 2024Updated last year
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆17Mar 19, 2025Updated 11 months ago
- Start to a project I never finished, Users are verified and checked before accessing the main page.☆10Sep 28, 2023Updated 2 years ago
- ☆38Feb 26, 2025Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆46Feb 23, 2026Updated last week
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- Proof Of Concepts☆55Jan 4, 2026Updated last month
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 2 years ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆65Nov 14, 2025Updated 3 months ago
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆34Jun 17, 2025Updated 8 months ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Feb 15, 2024Updated 2 years ago
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 3 months ago
- Client-side Encrypted Upload Server Python Script☆66Jul 10, 2025Updated 7 months ago
- A local privilege escalation vulnerability in VMware vCenter Server (and VMware Cloud Foundation) caused by a misconfiguration of sudo, a…☆58Jul 9, 2024Updated last year
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆17Dec 26, 2025Updated 2 months ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- Robot Vulnerability Scoring System (RVSS) Python 3 reference implementation.☆31Mar 18, 2020Updated 5 years ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆200Nov 12, 2024Updated last year
- Modular Enumeration and Password Spraying Framework☆129Apr 10, 2024Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- OmTraffic is a fast and efficient Python Omegle traffic bot that enables you to send a large number of messages to random strangers on Om…☆10May 21, 2023Updated 2 years ago
- ☆35Aug 30, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆862Feb 3, 2024Updated 2 years ago
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆275Feb 2, 2026Updated last month
- ☆38May 31, 2024Updated last year
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 2 months ago
- ☆13Aug 28, 2025Updated 6 months ago
- The Huawei Watchface Extractor is a Python script that allows you to extract images from HWT or com.huawei.watchface files. It can be use…☆11Sep 17, 2023Updated 2 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- ☆11Aug 31, 2019Updated 6 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Jan 10, 2025Updated last year