A powerful Redis exploitation tool that leverages CVE-2025-4984
☆65Oct 10, 2025Updated 5 months ago
Alternatives and similar repositories for CVE-2025-49844
Users that are interested in CVE-2025-49844 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 7 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- 红队渗透:Harbor 公开镜像地址批量获取脚本☆11Mar 4, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The Azure Execution Tool☆140Feb 6, 2026Updated last month
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- ☆15Jun 27, 2024Updated last year
- Checklists☆16Sep 22, 2016Updated 9 years ago
- 用于渗透测试、安全运维的插件化并发框架,自写插件可进行-PoC测试、子域发现、端口扫描等。☆14Feb 9, 2021Updated 5 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆10Feb 9, 2022Updated 4 years ago
- jxwaf-mini server☆11Mar 28, 2025Updated last year
- ☆12Feb 25, 2018Updated 8 years ago
- 集权利用工具☆166Feb 28, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆28Jul 11, 2025Updated 8 months ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- A Qemu Proxmox Template builder project using Packer☆73Dec 5, 2025Updated 3 months ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- ☆28Mar 26, 2020Updated 6 years ago
- XXST-白加黑辅助挖掘工具,全程静默运行不影响正常使用☆17Apr 12, 2024Updated last year
- ☆26Mar 11, 2025Updated last year
- Prevent in-process process termination by patching exit APIs☆65Nov 9, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 一款集成了Nuclei模板管理 、多空间引擎搜索的网络安全工具集。为安全研究人员提供高效的工作体验。☆22Mar 16, 2026Updated 2 weeks ago
- RPC to WebClient startup☆57Aug 19, 2025Updated 7 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- 一款微信小程序源码包信息收集工具,根据已有项目改编☆24Feb 11, 2025Updated last year
- 应急响应工具&文档☆16May 27, 2024Updated last year
- ☆13Mar 6, 2025Updated last year
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 6 months ago
- WebSocket and SQL Injection Exploit Script☆41Feb 27, 2025Updated last year
- ☆10Jan 8, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 6 months ago
- Android Jiagu unpacker - Automated DEX extraction and restoration from obfuscated APKs☆31Oct 29, 2025Updated 5 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆166Nov 2, 2025Updated 4 months ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated last month
- PHP DDoS/Stress Test☆11Feb 7, 2026Updated last month
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago