POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!
☆12Jul 5, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-5902
Users that are interested in CVE-2020-5902 are comparing it to the libraries listed below
Sorting:
- TelerikUI Vulnerability Scanner (CVE-2019-18935)☆12May 10, 2023Updated 2 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- Quickly identify the ownership of hosts to identify scope during penetration tests☆13Jul 19, 2024Updated last year
- A Python Typer-based CLI tool to generate fake data for Azure AD. AzDummy also uses Rich for some dope console output.☆13Apr 27, 2021Updated 4 years ago
- Invite users to a GitHub team in bulk☆12Jan 22, 2022Updated 4 years ago
- ☆11Jan 2, 2022Updated 4 years ago
- My efforts on installing macOS on Dell Inspiron 15-5567 (i3-7100u, IHD620)☆13Jun 6, 2024Updated last year
- Implementation of libsodium's secretstream in Go☆20Feb 10, 2026Updated 3 weeks ago
- A Telegram cleaning python script☆12Jul 15, 2021Updated 4 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- an article describing the privacy issues in Android OS☆34Apr 23, 2020Updated 5 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- A hobby project of a C++ game engine. Uses OpenGL and C++20☆15Feb 11, 2026Updated 3 weeks ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- ☆41Jan 19, 2023Updated 3 years ago
- Python program that denies internet access to a target within a local network...☆22Jun 7, 2021Updated 4 years ago
- CVE-2020-1958 PoC☆22Apr 11, 2020Updated 5 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Jan 17, 2016Updated 10 years ago
- Get the list of people that you have shared servers with☆48Oct 26, 2020Updated 5 years ago
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Nov 19, 2023Updated 2 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- Pwn2Win 2020 Challenges☆55May 7, 2021Updated 4 years ago
- Historical pre-merge OpenWrt archive☆24Jan 31, 2018Updated 8 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago
- ☆26Jul 2, 2020Updated 5 years ago
- ☆29Mar 29, 2019Updated 6 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- ☆22Sep 18, 2020Updated 5 years ago
- Block (Some) YouTube Pre-Roll Video Ads☆28Jul 11, 2020Updated 5 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆39Sep 29, 2015Updated 10 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- This blocklist is based on published surveys of most used advertising and tracking technology☆63Feb 24, 2026Updated last week
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Arabic News Stance Corpus☆11Feb 5, 2021Updated 5 years ago