This Repository Talks about the Follina MSDT from Defender Perspective
☆38Jun 2, 2022Updated 3 years ago
Alternatives and similar repositories for MSDT_CVE-2022-30190
Users that are interested in MSDT_CVE-2022-30190 are comparing it to the libraries listed below
Sorting:
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- Selenium based bot that automatize the creation of accounts in a web page☆15Nov 2, 2022Updated 3 years ago
- CVE-2021-21975 vRealize Operations Manager SSRF☆13Mar 31, 2021Updated 4 years ago
- This script is to build Wazuh 4.3 environment☆11May 30, 2022Updated 3 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A powershell poc to load and automatically run Certify and Rubeus from memory.☆17Aug 17, 2022Updated 3 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- Random stuff☆19May 28, 2024Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21May 1, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆84Mar 3, 2022Updated 4 years ago
- PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282☆53May 27, 2024Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Sep 8, 2022Updated 3 years ago
- ☆29Feb 16, 2021Updated 5 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆32Aug 16, 2023Updated 2 years ago
- ☆69Jun 20, 2023Updated 2 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Mar 7, 2023Updated 3 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Apr 26, 2025Updated 10 months ago
- General Content☆25Dec 23, 2025Updated 2 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated 11 months ago
- AADInternals-Endpoints PowerShell module☆35Jul 2, 2025Updated 8 months ago
- A rework of CMLuaUtil AutoElevated☆30Nov 6, 2022Updated 3 years ago
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- Contains all the required AWS Books, Code and materials for learning.☆19May 7, 2024Updated last year
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆94Apr 27, 2025Updated 10 months ago
- ☆10Mar 2, 2026Updated last week
- ☆94May 26, 2023Updated 2 years ago
- A Pythonic interface and command line tool for interacting with the InQuest Labs API.☆36Nov 18, 2025Updated 3 months ago
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆53Aug 28, 2025Updated 6 months ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago