☆48Dec 23, 2020Updated 5 years ago
Alternatives and similar repositories for DeltaGroup
Users that are interested in DeltaGroup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆575Jan 22, 2020Updated 6 years ago
- Citrix ADC Remote Code Execution☆84Jan 11, 2020Updated 6 years ago
- Proof-of-concept code for Heartbleed a.k.a. CVE2014-0160 with STARTTLS support for various protocols☆43Jan 7, 2019Updated 7 years ago
- A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.☆69Jan 26, 2020Updated 6 years ago
- ☆14Jul 15, 2018Updated 7 years ago
- Test a host for susceptibility to CVE-2019-19781☆109Oct 23, 2020Updated 5 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Powershell SMBv3 Compression checker☆28Apr 1, 2023Updated 2 years ago
- Burp Suite Extension to monitor new scope☆16Mar 31, 2021Updated 4 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- ☆19Jan 23, 2020Updated 6 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆33Aug 1, 2019Updated 6 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- A script to automate the creation of a "TOR" router on Debian based systems including Raspberry Pi and install the required tools to do s…☆14Jan 12, 2021Updated 5 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Jun 9, 2021Updated 4 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- ☆38Jul 3, 2020Updated 5 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- A HTTP PoC Endpoint for cve-2020-5260 which can be deployed to Heroku☆38Apr 16, 2020Updated 5 years ago
- ☆57May 13, 2020Updated 5 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- java UI 插件化漏洞扫描工具☆18Apr 14, 2020Updated 5 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- XSS平台源码☆13Dec 14, 2018Updated 7 years ago
- crawl links from a website☆23Jan 21, 2018Updated 8 years ago
- Meetuplardan arta kalanlar☆42Aug 18, 2025Updated 7 months ago
- Quickly identify the ownership of hosts to identify scope during penetration tests☆13Jul 19, 2024Updated last year
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- iSMET (A)symmetric Meterpreter Encryption Tool☆26Oct 26, 2020Updated 5 years ago