demining / Dao-ExploitLinks
Cryptanalysis of the DAO exploit & Multi-Stage Attack
☆19Updated last year
Alternatives and similar repositories for Dao-Exploit
Users that are interested in Dao-Exploit are comparing it to the libraries listed below
Sorting:
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- Custom Binary Ninja Themes☆12Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- ☆27Updated 2 years ago
- ☆13Updated 8 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- ☆17Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 3 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆14Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Updated last year
- Memory Scaner☆63Updated 3 years ago
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆14Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Updated 3 weeks ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- ☆18Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year