RevoltSecurities / CVE-2024-7339
An Vulnerability detection and Exploitation tool for CVE-2024-7339
☆18Updated 7 months ago
Alternatives and similar repositories for CVE-2024-7339:
Users that are interested in CVE-2024-7339 are comparing it to the libraries listed below
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆24Updated 9 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆9Updated last year
- Advanced test for proxy & waf☆13Updated 6 months ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Updated 8 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 10 months ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆19Updated 9 months ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 8 months ago
- Tool for scanning domains for .git directories.☆13Updated last year
- ☆13Updated last year
- ☆13Updated 2 weeks ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆22Updated this week
- Burp extension used to snip any header from all the requests.☆22Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- ☆28Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- Subdomains scanner Spider☆13Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆19Updated 6 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 7 months ago
- Make an Linux Kernel rootkit visible again.☆49Updated last month
- ☆12Updated 9 months ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated 9 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆16Updated 10 months ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆21Updated 7 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆17Updated 6 months ago
- ☆27Updated last year