Citrix CVE-2023-4966 from assetnote modified for parallel and file handling
☆11Oct 25, 2023Updated 2 years ago
Alternatives and similar repositories for citrix_cve-2023-4966
Users that are interested in citrix_cve-2023-4966 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- 基于多种策略, 对已有 JAR 包中的全限定类名进行变换, 无限生成高度相似的虚假类名☆18Jul 30, 2025Updated 8 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 10 months ago
- A simple website to act as a store for havoc modules and extensions☆30Jan 20, 2025Updated last year
- burp伪造ip爆破脚本☆16Nov 3, 2019Updated 6 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- ☆32Sep 23, 2022Updated 3 years ago
- BYOVD collection☆24Mar 20, 2024Updated 2 years ago
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- this is a bot that will get the correct answers right at least 90% of the time on edgenuity. edgenuity is a common site used for middle s…☆14Jun 28, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Sometimes, you need to manipulate low-level functionality (C APIs, etc) from high-level languages (Python). Eg. Force the low-level calls…☆15Jun 2, 2024Updated last year
- Most Responder's configuration power in your hand.☆54Jan 19, 2025Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆127Feb 18, 2024Updated 2 years ago
- One-header configurable C++20 COFF loader☆19Jul 21, 2025Updated 8 months ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- CATANA - CUT your Wordlist!☆16Oct 2, 2022Updated 3 years ago
- 红队作战中比较常遇到的一些重点系统漏洞整理。☆17Nov 24, 2020Updated 5 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN…☆80Oct 26, 2023Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆74Oct 28, 2023Updated 2 years ago
- ☆38Apr 5, 2024Updated 2 years ago
- A chrome extension that shows the time but steals the cookies in the back for demonstration purposes.☆24Mar 10, 2025Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- docker-compose 一键搭建 nextcloud 个人网盘☆12Nov 26, 2021Updated 4 years ago
- Chromium Cookie import / export tool☆11Jul 21, 2024Updated last year
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆111Jan 17, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 基于JavaFx编写的C/S图形化界面漏洞验证工具集。☆24Dec 30, 2021Updated 4 years ago
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Sep 8, 2023Updated 2 years ago
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆87Oct 18, 2024Updated last year
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆17Jan 20, 2023Updated 3 years ago
- ☆38Jun 5, 2023Updated 2 years ago
- List the ETW provider(s) in the registration table of a process.☆81Sep 20, 2023Updated 2 years ago