This Repository Talks about the Follina MSDT from Defender Perspective
☆38Jun 2, 2022Updated 3 years ago
Alternatives and similar repositories for MSDT_CVE-2022-30190
Users that are interested in MSDT_CVE-2022-30190 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Selenium based bot that automatize the creation of accounts in a web page☆15Nov 2, 2022Updated 3 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Mar 3, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- A collection of random small Aggressor snippets that don't warrant their own repo☆26Mar 23, 2023Updated 3 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- Generates an image from a given tweet! (Puppeteer + Netlify serverless functions + Svelte)☆11Jan 7, 2023Updated 3 years ago
- Powered by Library Genesis☆23Jun 4, 2016Updated 9 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- CLI generator for Velociraptor offline collector☆16Apr 20, 2026Updated 2 weeks ago
- This script is to build Wazuh 4.3 environment☆12May 30, 2022Updated 3 years ago
- Random stuff☆19May 28, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- USB rubber ducky 2.O, A simple programmes which stole victim sensitive data by USB in one click & bypass firewall & defender.☆11Apr 21, 2021Updated 5 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆59Mar 10, 2026Updated last month
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- ☆14Jul 11, 2024Updated last year
- ☆12Jun 24, 2022Updated 3 years ago
- IRIS Module to Run Any Velociraptor Artifact☆15Mar 31, 2023Updated 3 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21May 1, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- ☆16Aug 31, 2018Updated 7 years ago
- ☆11May 30, 2021Updated 4 years ago
- CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection☆31Jun 3, 2022Updated 3 years ago
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- Brutteforce for stego CTFs☆17Nov 2, 2022Updated 3 years ago
- OFFZONE 2024 Malware Persistence workshop☆24Dec 18, 2024Updated last year
- Repository resource for threat hunter☆159Sep 14, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Script to automate, manage, and multithread Nikto scans.☆64Feb 12, 2020Updated 6 years ago
- PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282☆53May 27, 2024Updated last year
- General Content☆27Dec 23, 2025Updated 4 months ago
- Repository for the Udemy Course: "Build an Advanced Keylogger using C++ for Ethical Hacking!" with instructor Ermin Kreponic☆12Feb 1, 2018Updated 8 years ago
- ☆29Feb 16, 2021Updated 5 years ago
- Field guide to gather low-hanging fruits☆15Mar 20, 2025Updated last year
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago