☆16Jan 4, 2025Updated last year
Alternatives and similar repositories for CVE-2024-6387_PoC
Users that are interested in CVE-2024-6387_PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 11 months ago
- BlueRepli-Plus☆18Jul 17, 2020Updated 5 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- ☆18Oct 8, 2024Updated last year
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A wildfire map built with Protomaps and MapLibre☆14Nov 18, 2024Updated last year
- You can find hardcoded Api-Key,Secret,Token Etc..☆77Sep 3, 2022Updated 3 years ago
- LDAP Enumeration Tool for Pentesters☆48Apr 22, 2025Updated 11 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Dec 23, 2024Updated last year
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration☆46Jan 15, 2026Updated 2 months ago
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated last year
- Wireshark sources, with additional sources for a plugin to read thrift messages☆14Jan 24, 2014Updated 12 years ago
- ProxmarkIII mods and designs made for the wild☆13Sep 23, 2016Updated 9 years ago
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Quickly fuzz URLs and scan for secrets directly in your browser tabs☆52Oct 25, 2025Updated 5 months ago
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆33Apr 15, 2025Updated 11 months ago
- A bash wrapper to help you connect to your instances☆15May 20, 2016Updated 9 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Jul 23, 2019Updated 6 years ago
- Aggregation of lists of malicious IP addresses (C2, malware, phishing), to be blocked in the LAN > WAN direction, integrated into firewal…☆25Updated this week
- Code for implementing MIDI over BLE using an Arduino 101☆17Dec 2, 2016Updated 9 years ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆63Feb 2, 2026Updated last month
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- ☆17Mar 22, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆21Jan 3, 2025Updated last year
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Dec 29, 2024Updated last year
- ☆28Sep 4, 2024Updated last year
- Java Random sequence crackers materials☆13May 25, 2014Updated 11 years ago
- A piece of Processing code that generates Isochronic Map☆20Dec 9, 2012Updated 13 years ago
- 2nd phase of mifare classic nested auth key recovery☆13Dec 11, 2014Updated 11 years ago
- Converts Half-WPA handshake to hashcat☆19Oct 29, 2018Updated 7 years ago
- Public transport analysis in cities.☆12Nov 3, 2023Updated 2 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Apr 24, 2018Updated 7 years ago
- Creating a Malicious Macro using MS Word☆26Jun 10, 2022Updated 3 years ago
- Network labs☆27Apr 27, 2025Updated 11 months ago
- This chef cookbook provides security configuration for mysql.☆27Updated this week
- The URL specification☆21Jun 18, 2015Updated 10 years ago
- Impacket☆50Feb 25, 2026Updated last month