Proof of Concept of CVE-2022-30190
☆38Oct 6, 2022Updated 3 years ago
Alternatives and similar repositories for Deathnote
Users that are interested in Deathnote are comparing it to the libraries listed below
Sorting:
- A Ransomware Based in AES256 Algorithm☆17Jul 28, 2022Updated 3 years ago
- POC Of CVE-2022-26937☆14Oct 7, 2022Updated 3 years ago
- A POC OF CVE-2022-2274 (openssl)☆16Sep 24, 2022Updated 3 years ago
- POC Of CVE-2022-21971☆11Oct 7, 2022Updated 3 years ago
- It Map Social Media With Photo☆30Oct 11, 2022Updated 3 years ago
- All Type Of Tools written in multipule language .☆22Oct 23, 2022Updated 3 years ago
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆25Jun 30, 2022Updated 3 years ago
- POC OF CVE-2022-21970☆14Oct 20, 2022Updated 3 years ago
- POC of CVE-2022-36537☆36Jun 18, 2025Updated 8 months ago
- A Web Vulnerability Scanner and Patcher☆170Feb 14, 2026Updated 2 weeks ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated last month
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- Windows_AFD_LPE_CVE-2023-21768☆59Aug 27, 2023Updated 2 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- VM Escape for Parallels Desktop <18.1.1☆37May 7, 2023Updated 2 years ago
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆33Jun 16, 2022Updated 3 years ago
- This is just a simple data recovery for Foxmail(http://foxmail.com.cn/)☆18Oct 16, 2015Updated 10 years ago
- a tool to bypass av for red team☆16Apr 21, 2022Updated 3 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Spring Cloud Function Vulnerable Application / CVE-2022-22963☆19Apr 1, 2022Updated 3 years ago
- genpatch is IDA plugin that generates a python script for patching binary☆37Dec 21, 2023Updated 2 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- ☆64Apr 28, 2022Updated 3 years ago
- NanoCore 1.0.3.0 RAT☆27Jul 14, 2021Updated 4 years ago
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆17Jun 22, 2025Updated 8 months ago
- A logging ASKPASS binary☆29May 29, 2020Updated 5 years ago
- PoC for CVE-2023-28771 based on Rapid7's excellent writeup☆30May 23, 2023Updated 2 years ago
- Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime☆314Aug 2, 2023Updated 2 years ago
- ☆11Feb 12, 2020Updated 6 years ago
- ☆12Jul 7, 2020Updated 5 years ago
- Linux on the RDP Thinbook☆10Dec 31, 2023Updated 2 years ago
- CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸☆34Jun 16, 2022Updated 3 years ago
- resource-based constrained delegation RBCD☆46Jan 15, 2022Updated 4 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Feb 22, 2022Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆38Oct 13, 2021Updated 4 years ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago