Exploit for CVE-2024-0402 in Gitlab
☆15Mar 18, 2025Updated 11 months ago
Alternatives and similar repositories for malicious-devfile-registry
Users that are interested in malicious-devfile-registry are comparing it to the libraries listed below
Sorting:
- PoC☆12Apr 7, 2025Updated 10 months ago
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- 一款简单的qvm管理工具☆24Aug 5, 2023Updated 2 years ago
- 基于JavaFX框架做的一款安卓漏洞分析桌面软件,采用了反编译技术与静态分析技术,上传apk包即可分析APP可能包含的风险。☆14Nov 23, 2022Updated 3 years ago
- 此文件用于配套“卫界安全-阿呆攻防”中所涉及的代码类文档☆11Apr 26, 2025Updated 10 months ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Get sql server connection configuration information☆28Aug 26, 2024Updated last year
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆184Oct 2, 2024Updated last year
- ☆97Jul 10, 2025Updated 7 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- Breaking git with a carriage return and cloning RCE☆50Jul 8, 2025Updated 7 months ago
- NailaoLoader: Hiding Execution Flow via Patching☆22Feb 27, 2025Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 10 months ago
- ☆17Nov 2, 2022Updated 3 years ago
- phpstudy dll backdoor for v2016 and v2018☆19Sep 27, 2019Updated 6 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago
- Bloodhound python Ingestor using ADWS☆32Feb 4, 2026Updated 3 weeks ago
- 通过RPC创建计划任务☆30May 18, 2025Updated 9 months ago
- ☆21Apr 30, 2025Updated 10 months ago
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- 一款利用某云厂商的物联网平台作为c2的框架☆23Jun 18, 2023Updated 2 years ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆127Feb 18, 2024Updated 2 years ago
- The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against know…☆19Aug 8, 2024Updated last year
- 一款最全未授权访问漏洞批量检测工具,集成40+常见未授权访问漏洞。☆35Jul 4, 2025Updated 8 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- ☆23Dec 2, 2022Updated 3 years ago
- CVE-2024-23897 - Jenkins 任意文件读取 利用工具☆87Mar 16, 2024Updated last year
- PoC-Malware-TTPs☆48Mar 26, 2023Updated 2 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Nov 19, 2024Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- ☆33Jan 23, 2025Updated last year
- 快速测试是否存在FastAdmin框架相关漏洞☆26Oct 14, 2024Updated last year
- PoC for CVE-2021-43557☆22Nov 22, 2021Updated 4 years ago
- ☆59Nov 18, 2024Updated last year