SecureDataLabs / BlackHat-EU-2018Links
Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence
☆22Updated 6 years ago
Alternatives and similar repositories for BlackHat-EU-2018
Users that are interested in BlackHat-EU-2018 are comparing it to the libraries listed below
Sorting:
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 6 years ago
- DoS PoC's for SAP products☆52Updated 7 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 9 years ago
- XSS payloads for edge cases☆34Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Updated 7 years ago
- My NSE Scripts☆62Updated 6 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Updated 8 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 7 years ago
- WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middlew…☆33Updated 5 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Updated last year
- Automates credential skimming from service accounts in Windows Registry☆77Updated 5 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Updated 7 years ago
- POC for CVE-2018-15685☆42Updated 7 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆67Updated 5 years ago
- Unified repository for different Metasploit Framework payloads☆48Updated 5 years ago
- Win32k Elevation of Privilege Poc☆24Updated 6 years ago
- Full TTY reverse shell over SSH☆59Updated 5 years ago
- IDS Bypass tricks☆122Updated 6 years ago
- A Java serializer in JavaScript☆81Updated 7 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- It is a repository for Red Team emulation based on MITRE ATT&CK.☆16Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- CVE-2018-6574 POC : golang 'go get' remote command execution during source code build☆24Updated 3 years ago
- A bunch of scripts used for network defense during competitions.☆15Updated 10 years ago
- ☆24Updated 5 years ago
- Burp Suite Attack Selector Plugin☆60Updated 8 years ago
- ☆46Updated 9 years ago