HP Data Protector Arbitrary Remote Command Execution
☆11Aug 12, 2018Updated 7 years ago
Alternatives and similar repositories for HP-Data-Protector-RCE
Users that are interested in HP-Data-Protector-RCE are comparing it to the libraries listed below
Sorting:
- Python script for automating the download of nessus reports☆27Aug 3, 2022Updated 3 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆37Aug 13, 2025Updated 6 months ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆13Oct 7, 2024Updated last year
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- ☆11May 30, 2021Updated 4 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- ☆12Dec 3, 2022Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Research code and scripts used in the Silburt et al. (2021) EMNLP 2021 paper 'FANATIC: FAst Noise-Aware TopIc Clustering'☆11Jul 6, 2023Updated 2 years ago
- ☆10Jan 28, 2026Updated 3 weeks ago
- A more generic version of https://github.com/dataarts/armsglobe for visualizing source/destination data☆10Jul 5, 2016Updated 9 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- Five pillars of computational reproducibility☆11Feb 6, 2024Updated 2 years ago
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆14May 24, 2022Updated 3 years ago
- A tool that automates the mundane tasks of pentesting Android apps. It uses APKTool and Dex2Jar.☆11May 29, 2020Updated 5 years ago
- Jolly good library for SPIF/Label/Clearance handling☆11Jan 2, 2024Updated 2 years ago
- Google Workspace password sprayer with anti-captcha☆14Feb 14, 2026Updated last week
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- ☆10May 6, 2021Updated 4 years ago
- SoapySDR Red Pitaya module☆10Oct 9, 2025Updated 4 months ago
- ☆10Apr 10, 2024Updated last year
- Register-based VM as C library☆10Feb 13, 2016Updated 10 years ago
- Powered by Library Genesis☆23Jun 4, 2016Updated 9 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- GPG Encrypts an IMAP folder☆12May 4, 2020Updated 5 years ago