amlweems / xzbotLinks
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
☆3,539Updated last year
Alternatives and similar repositories for xzbot
Users that are interested in xzbot are comparing it to the libraries listed below
Sorting:
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,432Updated last year
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆849Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,307Updated 6 months ago
- This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's a…☆2,038Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,346Updated this week
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,791Updated 4 months ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆992Updated last year
- Hash collisions and exploitations☆3,320Updated 11 months ago
- View HTTP/HTTPS requests made by any Linux program☆4,145Updated last month
- SSHamble: Unexpected Exposures in SSH☆1,173Updated last week
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,537Updated last week
- Portspoof☆2,406Updated last month
- SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: http…☆4,920Updated last year
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆384Updated last year
- Quickly find differences and similarities in disassembled code☆2,885Updated 3 months ago
- Run any Linux process in a secure, unprivileged sandbox using Landlock. Think firejail, but lightweight, user-friendly, and baked into th…☆2,083Updated 4 months ago
- Automated decoding of encrypted text without knowing the key or ciphers used☆841Updated this week
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆2,284Updated 2 months ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,702Updated last year
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆2,069Updated 2 months ago
- CVE cache of the official CVE List in CVE JSON 5 format☆2,458Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,360Updated 2 weeks ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,813Updated this week
- Reverse Engineering: Decompiling Binary Code with Large Language Models☆6,305Updated 2 weeks ago
- Analyze ELF binaries like a boss 😼🕵️♂️☆3,917Updated this week
- A rewrite of YARA in Rust.☆1,025Updated this week
- A tool for checking the security hardening options of the Linux kernel☆2,038Updated last month
- ☆329Updated 2 years ago
- Gather and update all available and newest CVEs with their PoC.☆7,538Updated this week
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆795Updated 3 years ago