YassDEV221608 / CVE-2024-6387_PoCView external linksLinks
☆15Jan 4, 2025Updated last year
Alternatives and similar repositories for CVE-2024-6387_PoC
Users that are interested in CVE-2024-6387_PoC are comparing it to the libraries listed below
Sorting:
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 9 months ago
- BlueRepli-Plus☆18Jul 17, 2020Updated 5 years ago
- Release repository for ProcDump-for-Mac☆41Nov 27, 2024Updated last year
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- This is an unnofficial API that can return the NBN availability information for properties including technology type, maximum line speed,…☆12Oct 2, 2023Updated 2 years ago
- A Docker-based development stack for Bedrock WordPress multisite, optimized for local development, source control, and CI/CD integration.☆13Jun 26, 2025Updated 7 months ago
- ☆61Jun 3, 2025Updated 8 months ago
- Hunt Smarter, Hunt Harder☆135Jan 12, 2026Updated last month
- AWS security training tasks for your first projects☆12Nov 4, 2024Updated last year
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆12Sep 4, 2025Updated 5 months ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- User-Defined C2 BOF Template☆27Nov 24, 2025Updated 2 months ago
- ☆10Nov 2, 2023Updated 2 years ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 9 months ago
- 用于若依和Jeecg数据库中密码的爆破☆23Jul 19, 2025Updated 6 months ago
- ☆12Nov 25, 2024Updated last year
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 8 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 3 months ago
- Impacket with --remove-mic-partial☆28Jan 8, 2026Updated last month
- A repository of remark/rehype, Zod, Astro plugins and more☆15Feb 8, 2026Updated last week
- ☆17Jun 16, 2025Updated 8 months ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- A dark retro theme for Zola☆31Dec 29, 2025Updated last month
- ☆14Jan 23, 2026Updated 3 weeks ago
- [DEPRECATED] Prometheus exporter for VPA recommendations☆12Aug 22, 2023Updated 2 years ago
- ☆23Sep 17, 2025Updated 4 months ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Get Windows Process List in Rust☆10May 4, 2022Updated 3 years ago
- Visual automation with Backstop JS☆10Jan 22, 2026Updated 3 weeks ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 5 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- webshell编码工具 支持 jsp net php asp编码免杀☆26Dec 16, 2025Updated 2 months ago