demining / Dao-Exploit
Cryptanalysis of the DAO exploit & Multi-Stage Attack
☆19Updated 11 months ago
Alternatives and similar repositories for Dao-Exploit:
Users that are interested in Dao-Exploit are comparing it to the libraries listed below
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated last year
- Monitor your target continuously for new subdomains!☆26Updated last year
- ☆13Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 7 months ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆19Updated 5 months ago
- ☆24Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated 2 years ago
- ☆27Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Updated 9 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Tool for scanning domains for .git directories.☆13Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆14Updated 11 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- ☆12Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆21Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Cobalt Strike BOFS☆15Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago