Pr0x13 / CVE-2014-4377Links
☆13Updated 10 years ago
Alternatives and similar repositories for CVE-2014-4377
Users that are interested in CVE-2014-4377 are comparing it to the libraries listed below
Sorting:
- ☆12Updated 10 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- ☆12Updated 8 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Network white noise collector☆19Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- My metasploit modules☆23Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Phishing Toolkit☆20Updated 7 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Password cracking utility☆53Updated 4 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- Format string exploit generation☆10Updated 9 years ago
- Shellcode tracer☆15Updated 8 years ago
- various exploits☆31Updated 12 years ago