Ridter / xslt_pocView external linksLinks
Execute codes From XSLT
☆16Dec 28, 2016Updated 9 years ago
Alternatives and similar repositories for xslt_poc
Users that are interested in xslt_poc are comparing it to the libraries listed below
Sorting:
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆15Aug 17, 2018Updated 7 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67May 27, 2018Updated 7 years ago
- Support x86 and x64☆66Apr 17, 2021Updated 4 years ago
- My tools repo☆17Oct 1, 2019Updated 6 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- List of Services (File Sharing, URL shorteners...)☆19Oct 4, 2020Updated 5 years ago
- 一些漏洞场景的还原,基于https://www.exploit-db.com/☆37Feb 7, 2018Updated 8 years ago
- ☆45Jul 12, 2018Updated 7 years ago
- 中国网络安全技术对抗赛代码☆16May 15, 2017Updated 8 years ago
- ☆18Dec 24, 2018Updated 7 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- Mainframe Transfer: PROTOCOL☆28Mar 26, 2021Updated 4 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- # Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS…☆53Jul 5, 2017Updated 8 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- 更新优化Demon的Metasploit Payload☆18Apr 16, 2017Updated 8 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 7 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Aug 22, 2018Updated 7 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Sep 18, 2018Updated 7 years ago
- CVE-2017-0213 for command line☆58Jul 1, 2017Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- fix time for java application using javaAgent☆24Dec 3, 2017Updated 8 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- exp of CVE-2018-15982☆181Jan 4, 2019Updated 7 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Oct 3, 2020Updated 5 years ago
- The Outlook HTML Leak Test Project☆131May 12, 2018Updated 7 years ago
- Windows Stagers to circumvent restrictive network environments☆68Sep 23, 2024Updated last year
- ☆34Nov 4, 2018Updated 7 years ago
- pentest floating repo (based off git submodules), and some useful scripts i wrote☆35Aug 24, 2022Updated 3 years ago
- Snort rules☆35Nov 20, 2018Updated 7 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆120Apr 30, 2019Updated 6 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- Search for available domain from expireddomains.net☆34Apr 29, 2018Updated 7 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago