Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal
☆13Aug 14, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-2034-POC
Users that are interested in CVE-2020-2034-POC are comparing it to the libraries listed below
Sorting:
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Bluetooth reverse shell.☆14Dec 16, 2020Updated 5 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Metasploit Framework☆19Apr 6, 2020Updated 5 years ago
- ☆20Jan 24, 2022Updated 4 years ago
- androrat☆22Nov 6, 2019Updated 6 years ago
- Apache Tomcat(CVE-2024-50379)条件竞争致 远程代码执行漏洞批量检测脚本☆19Apr 1, 2025Updated 11 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Dec 14, 2021Updated 4 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆13Oct 7, 2024Updated last year
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 11 years ago
- ☆22Mar 17, 2025Updated 11 months ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 9 months ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- Discord client zero-click RCE☆40Aug 25, 2021Updated 4 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- ☆12Aug 21, 2020Updated 5 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- This repository holds scripts to build quantum neural networks with a variety of encoding methods, parametric layer architectures, and me…☆12Jun 13, 2022Updated 3 years ago