Proof of Concept of CVE-2022-30190
☆38Oct 6, 2022Updated 3 years ago
Alternatives and similar repositories for Deathnote
Users that are interested in Deathnote are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Ransomware Based in AES256 Algorithm☆17Jul 28, 2022Updated 3 years ago
- A POC of CVE-2022-30206☆15Sep 26, 2022Updated 3 years ago
- POC Of CVE-2022-26937☆14Oct 7, 2022Updated 3 years ago
- A POC OF CVE-2022-2274 (openssl)☆16Sep 24, 2022Updated 3 years ago
- POC Of CVE-2022-21971☆11Oct 7, 2022Updated 3 years ago
- It Map Social Media With Photo☆30Oct 11, 2022Updated 3 years ago
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆25Jun 30, 2022Updated 3 years ago
- A Web Vulnerability Scanner and Patcher☆171Feb 14, 2026Updated last month
- POC of CVE-2022-36537☆36Jun 18, 2025Updated 9 months ago
- Config files for my GitHub profile.☆13Sep 3, 2025Updated 6 months ago
- VM Escape for Parallels Desktop <18.1.1☆37May 7, 2023Updated 2 years ago
- An x64 assembly implementation of essential data structures and algorithms for DSA.☆16Jun 4, 2023Updated 2 years ago
- Movie Recommendation System based on machine learning concepts☆10Sep 21, 2023Updated 2 years ago
- 在学习Java反序 列化漏洞的过程中,用来理解Java RMI程序的执行流程,演示如何攻击Java RMI程序的几个示例。☆11May 6, 2020Updated 5 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- © 哨兵博客 V3 Power by Bin4xin | Jekyll | Github Action.☆11Updated this week
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆17Jun 22, 2025Updated 9 months ago
- Spring Cloud Function Vulnerable Application / CVE-2022-22963☆19Apr 1, 2022Updated 3 years ago
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- ☆27Dec 17, 2021Updated 4 years ago
- This is just a simple data recovery for Foxmail(http://foxmail.com.cn/)☆18Oct 16, 2015Updated 10 years ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆23Sep 13, 2022Updated 3 years ago
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- Malice PDF Plugin☆16Jan 7, 2019Updated 7 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- a tool to bypass av for red team☆16Apr 21, 2022Updated 3 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆33Jun 16, 2022Updated 3 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- A Batch Script to uninstall multiple Android Apps at once☆16Nov 4, 2023Updated 2 years ago
- Unofficial QuickJS CMake scripts.☆17Jan 20, 2020Updated 6 years ago
- NanoCore 1.0.3.0 RAT☆26Jul 14, 2021Updated 4 years ago
- Windows Privilege Escalation Labs☆18May 10, 2021Updated 4 years ago
- Alleycat plugin by devttys0, ported to IDA 7☆16Apr 29, 2018Updated 7 years ago
- ☆64Apr 28, 2022Updated 3 years ago
- exploit-db备份☆15Jan 5, 2022Updated 4 years ago
- A tool that creates clips from longer videos (e.g YouTube video to social shorts aka OpusClip).☆15Jan 13, 2026Updated 2 months ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago