A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.
☆69Jan 26, 2020Updated 6 years ago
Alternatives and similar repositories for RDGScanner
Users that are interested in RDGScanner are comparing it to the libraries listed below
Sorting:
- My attempt at writing exploit POCs for various CVEs☆16Feb 8, 2020Updated 6 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆17Nov 14, 2025Updated 3 months ago
- Azure Template Skype for Business lab V3 with Edge, ADFS and PSTN Gateway☆13May 2, 2017Updated 8 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- Veracode security scanning build extension for Visual Studio Team Services☆14Mar 8, 2016Updated 9 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- ☆11May 2, 2022Updated 3 years ago
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- This repository supports the blog site www.cloudauditcontrols.com.☆15Dec 3, 2025Updated 2 months ago
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- ☆11Jan 6, 2020Updated 6 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- salt state definitions for installing logstash, elasticsearch and kibana☆36Aug 6, 2013Updated 12 years ago
- Whatever apt group's js from their scanbox framework☆11Jun 22, 2016Updated 9 years ago
- ☆12Aug 18, 2020Updated 5 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago
- Download raw (free) APKs from Google Play Store☆10Apr 26, 2018Updated 7 years ago
- ☆10Nov 29, 2016Updated 9 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- ☆48Dec 23, 2020Updated 5 years ago
- Examples demonstrating some common web application vulnerabilities.☆45Dec 15, 2015Updated 10 years ago
- A collection of XSS Attack vectors☆10Apr 26, 2025Updated 10 months ago
- Juniper Junos Space (CVE-2020-1611) (PoC)☆29Jan 22, 2020Updated 6 years ago
- ☆14Sep 11, 2019Updated 6 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- Implementation of differential fuzz testing for TLS handshake messages☆11Jul 2, 2021Updated 4 years ago
- ☆27Nov 21, 2017Updated 8 years ago