Nyamort / CVE-2024-52301View external linksLinks
☆20Nov 14, 2024Updated last year
Alternatives and similar repositories for CVE-2024-52301
Users that are interested in CVE-2024-52301 are comparing it to the libraries listed below
Sorting:
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- 🔐 AES 256 GCM encryption algorithm in Dart☆12Dec 17, 2021Updated 4 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- A minimal personal website 😉☆14Apr 1, 2025Updated 10 months ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- USSDParser is an Android service that allows intercepting and receiving USSD text messages results and re-broadcasting them for any liste…☆10Sep 30, 2020Updated 5 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆15Feb 1, 2026Updated 2 weeks ago
- ☆16Jun 15, 2025Updated 8 months ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- Two factor authentication through an Ethereum contract.☆12Aug 31, 2017Updated 8 years ago
- DLL Hijacking Detection Tool☆16Jun 21, 2025Updated 7 months ago
- ☆11Jun 8, 2022Updated 3 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- Crack your non-rooted android device pin code with 100% guarantee aslong as usb debugging has been enable. Wbruter also has support for p…☆14Aug 4, 2019Updated 6 years ago
- Sleep obfuscation in golang based on ekko☆13Jan 16, 2024Updated 2 years ago
- SSH Server☆12Nov 20, 2025Updated 2 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Node, Express, PostgreSQL, Vue 2 and Graphql CRUD Web App☆12Jun 19, 2025Updated 7 months ago
- Let's Encrypt Revocation Event☆13Mar 5, 2020Updated 5 years ago
- A free bookmarklet password generator.☆13May 31, 2014Updated 11 years ago
- Journey to learning frida android.☆11Apr 23, 2019Updated 6 years ago
- DLL reflective loader in golang☆16Dec 8, 2023Updated 2 years ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability☆15Apr 16, 2025Updated 10 months ago
- Windows x64 Exploitation Training☆15May 30, 2025Updated 8 months ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- A Decentralised microblogging website on ethereum blockchain☆14Jun 11, 2018Updated 7 years ago
- ☆12Nov 8, 2024Updated last year
- Quick test for CVE-2023-26025 behaviours☆13Nov 29, 2023Updated 2 years ago
- Code snippets and demo example for other projects☆13Apr 23, 2021Updated 4 years ago
- Filter writeups from ctftime.org by CATegories☆14Nov 4, 2019Updated 6 years ago
- Resources for regular people to learn about osint☆17Nov 17, 2019Updated 6 years ago
- it is a can make .net / clr applications can be the underlying hook winapi, and modify api execution flow.☆15May 21, 2016Updated 9 years ago
- ☆15Jan 10, 2019Updated 7 years ago
- Simple veracrypt container cracker using wordlist☆16May 14, 2021Updated 4 years ago
- Decentralised Wallet☆17Nov 12, 2023Updated 2 years ago