eastmountyxz / CVE-2020-0601-EXPLinks
这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油!
☆30Updated 5 years ago
Alternatives and similar repositories for CVE-2020-0601-EXP
Users that are interested in CVE-2020-0601-EXP are comparing it to the libraries listed below
Sorting:
- 非涉密源码☆19Updated last year
- ☆17Updated 4 years ago
- steal Windows Telegram Desktop session☆15Updated 4 years ago
- 感染PE文件的病毒学习过程☆32Updated 4 years ago
- Godzilla v1.0 source code☆38Updated 4 years ago
- Cobalt Strike teamserver detection.☆16Updated 4 years ago
- cobalt strike 自用脚本☆29Updated 4 years ago
- Set of IDA Pro scripts for parsing GoLang types information stored in compiled binary☆28Updated 4 years ago
- Post-exploitation script developed using impacket☆21Updated 3 years ago
- 专为蚁剑编写的独立WebShell服务程序☆8Updated 4 months ago
- SharpGetTitle - 基于 C# 的多线程 Web Title 扫描器☆15Updated 4 years ago
- Read Navicat 12 Password☆19Updated 5 years ago
- 窃取mstsc中的用户明文凭据☆47Updated 4 years ago
- 一款http协议的漏洞扫描框架☆28Updated 5 years ago
- a LINUX netfilter rookit by HTTP tunnel☆23Updated 4 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Updated 5 years ago
- 分析指定应用程序的劫持DLL☆14Updated 9 years ago
- 一些免杀对抗的玩意,学习仓库☆9Updated 4 years ago
- ☆22Updated 4 years ago
- 一款强大的内网信息收集工具,支持文件、文件夹、文件内容、命令、注册表、进程、mimikatz命令、dpapi、最近访问收集,且支持定制化配置,只需更新配置文件,定义收集规则,即可开启对各类浏览器、remote工具、聊天软件进行凭据、信息收集☆21Updated 2 years ago
- 记录流量的http(s)代理+分布式被动漏洞扫描☆23Updated 5 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Updated 3 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Updated 5 years ago
- dnslog reverse vul-verify 反连平台 漏洞验证☆16Updated 4 years ago
- Jsp Decoder Source Code☆16Updated 4 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆10Updated 3 years ago
- 技术文章☆22Updated 4 months ago
- redteam Build platform☆19Updated last year
- C# 编写的用于 Dropbox 文件上传☆20Updated 3 years ago
- 基于注册表劫持BypassUAC☆28Updated 4 years ago