eastmountyxz / CVE-2020-0601-EXPLinks
这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油!
☆30Updated 5 years ago
Alternatives and similar repositories for CVE-2020-0601-EXP
Users that are interested in CVE-2020-0601-EXP are comparing it to the libraries listed below
Sorting:
- 非涉密源码☆19Updated last year
- 感染PE文件的病毒学习过程☆32Updated 4 years ago
- 一款http协议的漏洞扫描框架☆27Updated 5 years ago
- SyscallLoader☆11Updated 4 years ago
- go实现的各种字符串匹配算法☆18Updated 8 years ago
- cs4.0 cs 4.1 beacon加解密☆25Updated 4 years ago
- steal Windows Telegram Desktop session☆15Updated 5 years ago
- Windows file stream util tool☆21Updated 12 years ago
- Set of IDA Pro scripts for parsing GoLang types information stored in compiled binary☆28Updated 5 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Updated 5 years ago
- RCE Exploit for Gitlab < 13.9.4☆51Updated 4 years ago
- ☆17Updated 4 years ago
- 窃取mstsc中的用户明文凭据☆47Updated 4 years ago
- 漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell☆13Updated 4 years ago
- Jsp Decoder Source Code☆16Updated 4 years ago
- Shellcode异或加密工具☆12Updated 8 years ago
- 横向移动三剑客 ( Lateral movement tools)☆30Updated 3 years ago
- redteam Build platform☆19Updated last year
- ☆38Updated 5 years ago
- Godzilla v1.0 source code☆38Updated 5 years ago
- inject shellcode into remote process via message hook☆15Updated 5 years ago
- 这是一个直接取得系统权限的项目☆48Updated 5 years ago
- 蚁剑其他脚本AES编/解码器☆36Updated 6 years ago
- Windows杀软对比和补丁号对比☆57Updated 6 years ago
- 寻找可注入进程☆13Updated 5 years ago
- 记录流量的http(s)代理+分布式被动漏洞扫描☆24Updated 6 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Updated 4 years ago
- ☆36Updated 5 years ago
- Read Navicat 12 Password☆19Updated 5 years ago
- Source code RDPUploader☆19Updated 6 years ago