☆26Sep 2, 2025Updated 5 months ago
Alternatives and similar repositories for Vulnerability-Research
Users that are interested in Vulnerability-Research are comparing it to the libraries listed below
Sorting:
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆21Sep 26, 2019Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- cve-2019-0604 SharePoint RCE exploit☆40Jun 26, 2019Updated 6 years ago
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- ☆12Jul 25, 2019Updated 6 years ago
- An0n 3xPloiTeR Shell☆35Oct 4, 2019Updated 6 years ago
- A Binary Ninja plugin for importing IDC database dumps from IDA.☆40Oct 13, 2022Updated 3 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Aug 11, 2017Updated 8 years ago
- ☆17Jun 17, 2022Updated 3 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- libssh CVE-2018-10933☆21Oct 20, 2018Updated 7 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- 一个Burpsuite插件,用于检测隐藏的XSS☆40Mar 31, 2019Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 6 years ago
- I created the python script to bypass UAC to get system shell .☆121Sep 2, 2019Updated 6 years ago
- Drcom 数据库账号密码加解密☆19Feb 23, 2018Updated 8 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆44Sep 18, 2019Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- SqlMap_BurpSuite☆51Aug 15, 2019Updated 6 years ago