☆15Jan 4, 2025Updated last year
Alternatives and similar repositories for CVE-2024-6387_PoC
Users that are interested in CVE-2024-6387_PoC are comparing it to the libraries listed below
Sorting:
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- BlueRepli-Plus☆18Jul 17, 2020Updated 5 years ago
- ☆60Updated this week
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- Convert Confluence MIME exports (.doc) to clean Markdown☆36Jan 13, 2026Updated last month
- A FullC2 Framework TUI + Web UI That Focuses On Network Stressing☆14Aug 24, 2025Updated 6 months ago
- This repo is a fix to allow you to load the Pushbullet Chrome Extension unpacked and have it work again.☆26Dec 6, 2025Updated 3 months ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- ☆62Jun 3, 2025Updated 9 months ago
- 一款集成了Nuclei模板管理、多空间引擎搜索的网络安全工具集。为安全研究人员提供高效的工作体验。☆22Updated this week
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆13Sep 4, 2025Updated 6 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- 在线安软识别☆12Aug 6, 2025Updated 7 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 9 months ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- Automatically distribute GitHub Actions workflow across repositories.☆12Mar 1, 2026Updated last week
- 在原版nps的基础上,增加了nps探测,以及对应的利用方式(如获取cookie,页面等),进行一些简单的二开。未经过大量测试,可能存在bug。☆21Aug 5, 2025Updated 7 months ago
- ☆26Updated this week
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- ☆10Nov 2, 2023Updated 2 years ago
- dcsync bof☆45Feb 13, 2026Updated 3 weeks ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 weeks ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- ☆16Oct 7, 2025Updated 5 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- 用于若依和Jeecg数据库中密码的爆破☆23Jul 19, 2025Updated 7 months ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- ☆16Jan 23, 2026Updated last month
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆14May 5, 2025Updated 10 months ago
- AWS security training tasks for your first projects☆12Nov 4, 2024Updated last year
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- A repository of remark/rehype, Zod, Astro plugins and more☆18Feb 21, 2026Updated 2 weeks ago