eastmountyxz / CVE-2020-0601-EXP
这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油!
☆29Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2020-0601-EXP
- ☆16Updated 3 years ago
- 非涉密源码☆19Updated 7 months ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆13Updated 4 years ago
- gxor程序根据输入的二进制文件进行异或运算输出☆22Updated 3 years ago
- 一款http协议的漏洞扫描框架☆28Updated 4 years ago
- Jsp Decoder Source Code☆16Updated 3 years ago
- ☆19Updated 3 years ago
- Cobalt Strike teamserver detection.☆16Updated 3 years ago
- 感染PE文件的病毒学习过程☆31Updated 3 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆10Updated 2 years ago
- redteam Build platform☆19Updated 11 months ago
- SharpGetTitle - 基于 C# 的多线程 Web Title 扫描器☆15Updated 3 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Updated 3 years ago
- 御剑协议切换器,可以让现有的程序不需要修改就可以轻松的把传输类型切换成常见的TCP/UDP/HTTP/NTP/DNS/ICMP等☆10Updated 4 years ago
- burpsuite Unicode解码插件☆10Updated 4 years ago
- cobalt strike 自用脚本☆27Updated 4 years ago
- C# 编写的用于 Dropbox 文件上传☆20Updated 2 years ago
- steal Windows Telegram Desktop session☆14Updated 4 years ago
- Windows NTLMSSP library☆10Updated 4 years ago
- 分析指定应用程序的劫持DLL☆14Updated 9 years ago
- CVE-2020-9548:FasterXML/jackson-databind 远程代码执行漏洞☆23Updated 4 years ago