ToolShell scanner - CVE-2025-53770 and detection information
☆18Dec 7, 2025Updated 3 months ago
Alternatives and similar repositories for CVE-2025-53770-Scanner
Users that are interested in CVE-2025-53770-Scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jun 26, 2023Updated 2 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆53Jan 11, 2025Updated last year
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- XSS-Checker is a tool used to Check / Validate for XSS vulnerabilities☆18Dec 1, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- NRefactory - Refactoring Your C# Code☆15Jun 22, 2024Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- Thanks to @d35ha☆13Aug 16, 2021Updated 4 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- Powerful WiFi Hacking penetration testing tools for Linux, designed for ethical hacking, security testing, and network auditing.☆16Nov 18, 2025Updated 4 months ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 6 years ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- ☆48Dec 5, 2025Updated 3 months ago
- Detonate malware on VMs and get logs & detection status☆89Mar 17, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- SharePoint WebPart Injection Exploit Tool☆311Nov 28, 2025Updated 3 months ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- 使用kcp实现的socks5正向代理☆12Dec 9, 2023Updated 2 years ago
- ☆12Aug 27, 2025Updated 6 months ago
- Terminate the eventlog thread to disable the windows eventlog☆21Apr 1, 2020Updated 5 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- https://bc-security.gitbook.io/empire-wiki/☆13Aug 2, 2023Updated 2 years ago
- Squid SSL Proxy with SSL Bump for intercepting SSL traffic☆10Sep 10, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆30Jul 11, 2025Updated 8 months ago
- ☆13Jul 12, 2021Updated 4 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆12May 25, 2025Updated 10 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆25Mar 18, 2021Updated 5 years ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆23Oct 30, 2024Updated last year
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆16Jul 10, 2025Updated 8 months ago
- Sonar is a security researcher's Swiss army knife for finding and exploiting vulnerabilities that require out-of-band interactions☆21Mar 11, 2026Updated 2 weeks ago
- 一个简单的 稳定 ICMP 传输 示例,在公网中传输可能有点慢,但很稳定,适合初学者☆11Mar 9, 2022Updated 4 years ago
- ESP32 Marauder Portable IDE creation script☆10Oct 10, 2022Updated 3 years ago
- C++ project used for quickly querying all files/directories located on an NTFS volume/partition. It works by reading and parsing file rec…☆23Aug 26, 2025Updated 7 months ago
- ☆27Mar 6, 2025Updated last year
- ☆18Jun 10, 2025Updated 9 months ago