eastmountyxz / CVE-2020-0601-EXP
这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油!
☆29Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2020-0601-EXP
- 非涉密源码☆19Updated 8 months ago
- ☆16Updated 3 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆13Updated 4 years ago
- Read Navicat 12 Password☆19Updated 4 years ago
- Set of IDA Pro scripts for parsing GoLang types information stored in compiled binary☆28Updated 4 years ago
- 感染PE文件的病毒学习过程☆31Updated 3 years ago
- 横向移动三剑客 ( Lateral movement tools)☆29Updated 3 years ago
- inject shellcode into remote process via message hook☆15Updated 4 years ago
- Jsp Decoder Source Code☆16Updated 3 years ago
- ☆36Updated 4 years ago
- go实现的各种字符串匹配算法☆18Updated 7 years ago
- Godzilla v1.0 source code☆38Updated 4 years ago
- cs4.0 cs 4.1 beacon加解密☆26Updated 3 years ago
- Post-exploitation script developed using impacket☆21Updated 2 years ago
- works but not work, cao!☆24Updated 3 years ago
- antSword的源码和加载器☆14Updated last year
- 一款http协议的漏洞扫描框架☆28Updated 4 years ago
- burpsuite Unicode解码插件☆10Updated 4 years ago
- CVE-2020-9548:FasterXML/jackson-databind 远程代码执行漏洞☆23Updated 4 years ago
- C# 编写的用于 Dropbox 文件上传☆20Updated 2 years ago
- ☆15Updated 4 years ago
- svc WebShell☆48Updated 6 years ago
- 窃取mstsc中的用户明文凭据☆45Updated 3 years ago
- scrapy website Article and link ...☆16Updated 3 years ago
- ☆19Updated 3 years ago