Sait-Nuri / CVE-2018-15473View external linksLinks
OpenSSH 2.3 < 7.7 - Username Enumeration
☆43Sep 4, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2018-15473
Users that are interested in CVE-2018-15473 are comparing it to the libraries listed below
Sorting:
- Conti V3 source code updated☆11Jun 30, 2022Updated 3 years ago
- ☆26Jul 7, 2021Updated 4 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆111Apr 29, 2024Updated last year
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆19Dec 18, 2025Updated last month
- ☆36Jun 23, 2022Updated 3 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- ☆36Jan 22, 2025Updated last year
- ☆10May 5, 2024Updated last year
- Um compilado de links para introduzir os chegados nas artes negras da engenharia reversa.☆26Aug 21, 2020Updated 5 years ago
- An organized collection of default passwords for various devices and services.☆42Dec 7, 2022Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆38Oct 13, 2021Updated 4 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago
- ☆13Feb 9, 2026Updated last week
- Hashcrypt es una herramienta criptográfica que permite cifrar un texto en 5 tipos de hash.☆10Feb 8, 2021Updated 5 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆14Feb 19, 2021Updated 4 years ago
- ☆47May 20, 2025Updated 8 months ago
- ☆159Jan 7, 2022Updated 4 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Preparation for OSWE☆47Apr 19, 2020Updated 5 years ago
- Exploit for CVE-2020-15778(OpenSSH vul)☆37Feb 18, 2022Updated 3 years ago
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- A simple CLI tool to display (or save) man pages as PDFs.☆14Feb 6, 2026Updated last week
- Benchmarks for various Zsh frameworks☆12Dec 15, 2025Updated 2 months ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- Some terrible features you can add to Python☆12Jan 27, 2019Updated 7 years ago
- Get a free freebsd shell☆13Nov 8, 2025Updated 3 months ago
- Sencillo script que nos permite eliminar automáticamente todos los archivos duplicados de dos carpetas diferentes.☆12Apr 20, 2022Updated 3 years ago
- Openvpn client in a docker container.☆11Nov 5, 2024Updated last year
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆13Jun 22, 2023Updated 2 years ago
- ☆10Jan 25, 2023Updated 3 years ago
- Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerabili…☆10May 14, 2023Updated 2 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago