☆20Nov 14, 2024Updated last year
Alternatives and similar repositories for CVE-2024-52301
Users that are interested in CVE-2024-52301 are comparing it to the libraries listed below
Sorting:
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 5 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 10 months ago
- Pine and Frida better together☆15Oct 30, 2024Updated last year
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- ☆11Dec 8, 2023Updated 2 years ago
- ☆16Jun 15, 2025Updated 8 months ago
- DNA as an information storage medium using either 4-base codon or binary representations of 256-ASCII☆11Sep 6, 2013Updated 12 years ago
- 🔐 AES 256 GCM encryption algorithm in Dart☆12Dec 17, 2021Updated 4 years ago
- "Locks" your MacBook using your charging cable – an alarm is played if unplugged, not more...☆12Jul 25, 2018Updated 7 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated last month
- USSDParser is an Android service that allows intercepting and receiving USSD text messages results and re-broadcasting them for any liste…☆10Sep 30, 2020Updated 5 years ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- Two factor authentication through an Ethereum contract.☆12Aug 31, 2017Updated 8 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- A minimal personal website 😉☆14Apr 1, 2025Updated 11 months ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 10 months ago
- Let's Encrypt Revocation Event☆13Mar 5, 2020Updated 6 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- A free bookmarklet password generator.☆13May 31, 2014Updated 11 years ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- Sleep obfuscation in golang based on ekko☆13Jan 16, 2024Updated 2 years ago
- Journey to learning frida android.☆11Apr 23, 2019Updated 6 years ago
- SSH Server☆12Nov 20, 2025Updated 3 months ago
- DLL reflective loader in golang☆16Dec 8, 2023Updated 2 years ago
- ☆12Nov 8, 2024Updated last year
- Windows x64 Exploitation Training☆16May 30, 2025Updated 9 months ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- Code snippets and demo example for other projects☆14Apr 23, 2021Updated 4 years ago
- Filter writeups from ctftime.org by CATegories☆14Nov 4, 2019Updated 6 years ago
- Quick test for CVE-2023-26025 behaviours☆13Nov 29, 2023Updated 2 years ago
- Perform With Massive Wordpress Enumeration☆12Aug 18, 2023Updated 2 years ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 7 months ago