Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.
☆60Aug 21, 2024Updated last year
Alternatives and similar repositories for dp_cryptomg
Users that are interested in dp_cryptomg are comparing it to the libraries listed below
Sorting:
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- A python-based padding oracle tool☆20Updated this week
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Feb 13, 2026Updated last month
- ☆39Apr 3, 2023Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- ☆64Jan 2, 2024Updated 2 years ago
- ☆100Mar 31, 2022Updated 3 years ago
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)☆176Dec 22, 2020Updated 5 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Oct 17, 2023Updated 2 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆365Apr 14, 2022Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- CVE-2018-6066 using VBA☆67Oct 24, 2022Updated 3 years ago
- ☆128Mar 1, 2023Updated 3 years ago
- A little tool to play with the Seclogon service☆326Jul 10, 2022Updated 3 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- Decode obfuscated ldap_default_authtok from sssd.conf☆28Mar 7, 2019Updated 7 years ago
- ☆382Jan 19, 2023Updated 3 years ago
- Source Code Management Attack Toolkit☆133Sep 20, 2022Updated 3 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated 3 weeks ago
- ☆100Sep 1, 2024Updated last year
- ADCS cert template modification and ACL enumeration☆143Jun 26, 2023Updated 2 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆61Mar 19, 2021Updated 5 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- ☆20Sep 6, 2025Updated 6 months ago
- ☆198Mar 28, 2025Updated 11 months ago
- Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)☆182Aug 22, 2020Updated 5 years ago
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆300Mar 1, 2023Updated 3 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆94Aug 1, 2022Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆130Apr 6, 2022Updated 3 years ago