archanchoudhury / MSDT_CVE-2022-30190View external linksLinks
This Repository Talks about the Follina MSDT from Defender Perspective
☆38Jun 2, 2022Updated 3 years ago
Alternatives and similar repositories for MSDT_CVE-2022-30190
Users that are interested in MSDT_CVE-2022-30190 are comparing it to the libraries listed below
Sorting:
- All my POC related to malware development☆14May 13, 2024Updated last year
- Selenium based bot that automatize the creation of accounts in a web page☆14Nov 2, 2022Updated 3 years ago
- CVE-2021-21975 vRealize Operations Manager SSRF☆13Mar 31, 2021Updated 4 years ago
- This script is to build Wazuh 4.3 environment☆11May 30, 2022Updated 3 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- Random stuff☆19May 28, 2024Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21May 1, 2023Updated 2 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Mar 3, 2022Updated 3 years ago
- PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282☆53May 27, 2024Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Sep 8, 2022Updated 3 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- ☆29Feb 16, 2021Updated 5 years ago
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- ☆68Jun 20, 2023Updated 2 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- General Content☆25Dec 23, 2025Updated last month
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Mar 7, 2023Updated 2 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Apr 26, 2025Updated 9 months ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆46Jun 28, 2025Updated 7 months ago
- ☆34Apr 17, 2025Updated 10 months ago
- Automate converting webshells into reverse shells.☆72Jan 19, 2026Updated 3 weeks ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆35Mar 24, 2025Updated 10 months ago
- Contains all the required AWS Books, Code and materials for learning.☆19May 7, 2024Updated last year
- A rework of CMLuaUtil AutoElevated☆30Nov 6, 2022Updated 3 years ago
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆91Apr 27, 2025Updated 9 months ago
- Apache Tomcat Manager API WAR Shell Upload☆35Jul 9, 2020Updated 5 years ago
- ☆41Aug 8, 2023Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆88May 9, 2023Updated 2 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆38Apr 27, 2025Updated 9 months ago
- ☆10Jan 26, 2026Updated 3 weeks ago
- ☆94May 26, 2023Updated 2 years ago
- A Pythonic interface and command line tool for interacting with the InQuest Labs API.☆36Nov 18, 2025Updated 2 months ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago