demining / Dao-ExploitLinks
Cryptanalysis of the DAO exploit & Multi-Stage Attack
☆19Updated last year
Alternatives and similar repositories for Dao-Exploit
Users that are interested in Dao-Exploit are comparing it to the libraries listed below
Sorting:
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- Custom Binary Ninja Themes☆12Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- hiding in plain sight: part 2☆44Updated last year
- ☆12Updated 3 years ago
- ☆17Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- ☆14Updated 9 months ago
- This is a working variant of the Mirai IOT botnet☆14Updated 3 years ago
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- ☆27Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 3 years ago
- ☆18Updated 3 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Slides and videos from talks given at cons☆25Updated 6 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 3 months ago
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆14Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- ☆25Updated 3 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Updated 2 months ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 4 years ago