blackhuntop / Ghost-CveLinks
GitHub CVE Repository Hunt
☆18Updated 11 months ago
Alternatives and similar repositories for Ghost-Cve
Users that are interested in Ghost-Cve are comparing it to the libraries listed below
Sorting:
- aiohttp LFI (CVE-2024-23334)☆27Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 11 months ago
- LSTAR - CobaltStrike Translated to EN☆17Updated 2 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆22Updated 10 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆21Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- ECC Public Key Cryptography☆38Updated last year
- ☆18Updated 6 months ago
- hiding in plain sight: part 2☆45Updated 11 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated last year
- ☆28Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago
- Useful collection of scapy-scripts and more☆28Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated 9 months ago
- ☆18Updated last week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Slides and videos from talks given at cons☆20Updated this week
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆12Updated 3 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 9 months ago
- 1C RAS Offensive Security Tool☆26Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17Updated last year
- ☆14Updated 3 months ago
- ☆18Updated 6 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 9 months ago
- Finding secrets in various (non-text) popular files.☆25Updated 5 months ago
- ☆28Updated last year
- ☆35Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year