Exploit for CVE-2024-0402 in Gitlab
☆15Mar 18, 2025Updated last year
Alternatives and similar repositories for malicious-devfile-registry
Users that are interested in malicious-devfile-registry are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC☆12Apr 7, 2025Updated 11 months ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- 一款简单的qvm管理工具☆24Aug 5, 2023Updated 2 years ago
- Get sql server connection configuration information☆28Aug 26, 2024Updated last year
- 基于JavaFX框架做的一款安 卓漏洞分析桌面软件,采用了反编译技术与静态分析技术,上传apk包即可分析APP可能包含的风险。☆14Nov 23, 2022Updated 3 years ago
- 此文件用于配套“卫界安全-阿呆攻防”中所涉及的代码类文档☆11Apr 26, 2025Updated 10 months ago
- ☆17Nov 2, 2022Updated 3 years ago
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆184Oct 2, 2024Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 11 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- A lightweight reverse proxy server that converts TLS traffic to TCP, allowing secure communication between clients and upstream servers.☆79Aug 16, 2024Updated last year
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- 一款利用某云厂商的物联网平台作为c2的框架☆23Jun 18, 2023Updated 2 years ago
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago
- Breaking git with a carriage return and cloning RCE☆50Jul 8, 2025Updated 8 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 9 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- An end-to-end serverless application that extracts thumbnails from video files using AWS Fargate, AWS Lambda and the Serverless Framework…☆49Mar 30, 2019Updated 6 years ago
- ☆97Jul 10, 2025Updated 8 months ago
- PoC for CVE-2021-43557☆22Nov 22, 2021Updated 4 years ago
- https://marsvillager.github.io/PaperWorkflowAutomation/summary/visualize.html (Safari, Firefox ✓ Edge, Chrome ✗) 论文爬虫+概述: IEEE Symposium …☆13Oct 1, 2025Updated 5 months ago
- phpstudy dll backdoor for v2016 and v2018☆19Sep 27, 2019Updated 6 years ago
- Windows C++ Implant for Exploration C2☆45Jan 26, 2026Updated last month
- 通过RPC创建计划任务☆31May 18, 2025Updated 10 months ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- CVE-2024-23897 - Jenkins 任意文件读取 利用工具☆87Mar 16, 2024Updated 2 years ago
- ☆33Jan 23, 2025Updated last year
- 针对Java Web的RASP(Runtime application self-protection )漏洞防护系统。☆41Sep 10, 2025Updated 6 months ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- ☆18Aug 15, 2025Updated 7 months ago
- The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against know…☆19Aug 8, 2024Updated last year
- ☆114Aug 25, 2023Updated 2 years ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- 在spring-aop中新发现的反序列化gadget-chain☆52Jan 12, 2025Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆127Feb 18, 2024Updated 2 years ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago