Pr0x13 / CVE-2014-4377
☆14Updated 10 years ago
Alternatives and similar repositories for CVE-2014-4377:
Users that are interested in CVE-2014-4377 are comparing it to the libraries listed below
- ☆12Updated 10 years ago
- All tools you needed during penetration testing.☆17Updated 7 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- various exploits☆31Updated 12 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- WAF bypass toolkit☆9Updated 9 years ago
- Network white noise collector☆18Updated 8 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 13 years ago
- log file scrubber☆15Updated 6 years ago
- IP Address Listing Tool☆12Updated 11 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- My metasploit modules☆11Updated 9 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ☆71Updated 10 years ago
- ☆16Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- SNMP Backdoor Communication Channel☆15Updated 13 years ago