demining / Dao-Exploit
Cryptanalysis of the DAO exploit & Multi-Stage Attack
☆19Updated 10 months ago
Alternatives and similar repositories for Dao-Exploit:
Users that are interested in Dao-Exploit are comparing it to the libraries listed below
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Tool for scanning domains for .git directories.☆12Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆14Updated 11 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated 8 months ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- ☆13Updated last year
- ☆24Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆14Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆59Updated 2 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- ManageEngine ADManager Command Injection☆11Updated last year
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- ASPX Shellcode Ceasar Encrypted Generator is a Python script automating shellcode generation, embedding, encryption, and execution in an …☆12Updated last year
- ☆27Updated last year
- Monitor your target continuously for new subdomains!☆26Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 6 months ago
- ☆21Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- lightweight http redirector written in nim☆11Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year