CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
☆18Feb 5, 2018Updated 8 years ago
Alternatives and similar repositories for CVE-2017-4878-Samples
Users that are interested in CVE-2017-4878-Samples are comparing it to the libraries listed below
Sorting:
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- CVE-2018-6574 POC : golang 'go get' remote command execution during source code build☆24Jan 14, 2022Updated 4 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 7 years ago
- CVE-2018-15982_PoC☆14Nov 6, 2019Updated 6 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- 对windows-api内容进行自动审查和过滤监控☆15May 30, 2017Updated 8 years ago
- glibc getcwd() local privilege escalation compiled binaries☆32Feb 9, 2018Updated 8 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 3 years ago
- A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)☆16Aug 29, 2018Updated 7 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Jan 13, 2016Updated 10 years ago
- 逆向小红伞杀毒软件驱动——avdevprot☆24Dec 3, 2017Updated 8 years ago
- Malware sandbox evasion tricks and solution☆32Jul 5, 2017Updated 8 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- HTTP/HTTPS/DNS inspector (windows driver)☆27Feb 20, 2019Updated 7 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- 网络安全态势感知新闻平台(前台)☆20Jun 27, 2018Updated 7 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- x64 Kernel Hooks Detection☆24Jan 1, 2017Updated 9 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 7 years ago
- Large Scale Cumulative Binary Diffing.☆25Mar 10, 2018Updated 7 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 8 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- 一个简单的php危险函数检测工具☆10Dec 19, 2018Updated 7 years ago
- ☆164May 18, 2018Updated 7 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago