Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.
☆61Aug 21, 2024Updated last year
Alternatives and similar repositories for dp_cryptomg
Users that are interested in dp_cryptomg are comparing it to the libraries listed below
Sorting:
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆32Feb 13, 2026Updated 2 weeks ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- ☆40Apr 3, 2023Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- A python-based padding oracle tool☆20Aug 14, 2024Updated last year
- Partially offline multi-language translator built upon Huggingface transformers.☆17Sep 12, 2022Updated 3 years ago
- ☆20Sep 6, 2025Updated 5 months ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Aug 31, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- ☆101Mar 31, 2022Updated 3 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆30Updated this week
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆365Apr 14, 2022Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆66Oct 17, 2023Updated 2 years ago
- D/Invoke implementation in Nim☆101Jun 8, 2022Updated 3 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- Decode obfuscated ldap_default_authtok from sssd.conf☆29Mar 7, 2019Updated 6 years ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- ☆65Jan 2, 2024Updated 2 years ago
- ADCS cert template modification and ACL enumeration☆144Jun 26, 2023Updated 2 years ago
- ☆198Mar 28, 2025Updated 11 months ago
- CVE-2018-6066 using VBA☆68Oct 24, 2022Updated 3 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆301Mar 1, 2023Updated 3 years ago
- Source Code Management Attack Toolkit☆134Sep 20, 2022Updated 3 years ago
- ☆129Mar 1, 2023Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆62Mar 19, 2021Updated 4 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆113Jan 25, 2024Updated 2 years ago
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- POC tools for exploring SMB over QUIC protocol☆131Apr 6, 2022Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- A little tool to play with the Seclogon service☆327Jul 10, 2022Updated 3 years ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 3 years ago
- ☆383Jan 19, 2023Updated 3 years ago