A simple scanner for identifying vulnerable cups-browsed instances on your network
☆66Oct 7, 2024Updated last year
Alternatives and similar repositories for CVE-2024-47176-Scanner
Users that are interested in CVE-2024-47176-Scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆43Sep 30, 2024Updated last year
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- ☆11Mar 7, 2021Updated 5 years ago
- ☆39Feb 26, 2025Updated last year
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- Proof Of Concepts☆55Jan 4, 2026Updated 2 months ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Sep 22, 2021Updated 4 years ago
- Simplified version of flashrom for installing new system firmware☆23Mar 10, 2023Updated 3 years ago
- The Microsoft Student Security Operations Center (SOC) Toolkit is designed to equip facilitators with everything needed to prepare high s…☆21Jul 1, 2025Updated 8 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆47Dec 22, 2023Updated 2 years ago
- ☆39May 31, 2024Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Squid and Stunnel assembled as a proxy server☆12Mar 2, 2017Updated 9 years ago
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 3 months ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- Recipes for some popular Rust tools☆14Jul 11, 2025Updated 8 months ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 8 months ago
- OmTraffic is a fast and efficient Python Omegle traffic bot that enables you to send a large number of messages to random strangers on Om…☆10May 21, 2023Updated 2 years ago
- A simple tool that generates a bunch of 50 second clips from one video. Easily create youtube shorts and tiktoks from longer videos.☆11Feb 10, 2023Updated 3 years ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆66Nov 14, 2025Updated 4 months ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Quick and dirty PoSH code to read teams messages☆23Feb 5, 2025Updated last year
- ☆11Dec 27, 2023Updated 2 years ago
- ☆53Feb 4, 2025Updated last year
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆17Dec 26, 2025Updated 2 months ago
- ☆10Jul 1, 2023Updated 2 years ago
- A local privilege escalation vulnerability in VMware vCenter Server (and VMware Cloud Foundation) caused by a misconfiguration of sudo, a…☆57Jul 9, 2024Updated last year
- Silver SAML forgery tool☆56Feb 26, 2024Updated 2 years ago
- Python 3 driver and integrated PyGame point cloud viewer for RPLIDAR sensors☆17Sep 26, 2019Updated 6 years ago
- AbuseIPDB integration enabling automatic reporting of malicious activity detected by T-Pot honeypots by monitoring logs, analyzing attack…☆16Mar 16, 2026Updated last week
- Proactive Remediation script: Update Lenovo BIOS to the latest version directly from Lenovo website☆14Mar 17, 2025Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- IDA plugin for UEFI firmware analysis and reverse engineering automation☆14May 14, 2022Updated 3 years ago
- A maubot plugin to invite users to Matrix rooms according to LDAP groups☆19Aug 16, 2021Updated 4 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago