ebrasha / abdal-anydesk-remote-ip-detectorLinks
CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.
☆34Updated last year
Alternatives and similar repositories for abdal-anydesk-remote-ip-detector
Users that are interested in abdal-anydesk-remote-ip-detector are comparing it to the libraries listed below
Sorting:
- Memory Scaner☆63Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆119Updated last year
- CVE-2023-20198 & 0Day Implant Scanner☆32Updated 6 months ago
- ☆138Updated last week
- Kali Packerge Manager☆64Updated 2 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- ICMPWatch: ICMP Packet Sniffer☆58Updated last year
- PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)☆44Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- Windows And Ways To Break It☆101Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆39Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 3 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 11 months ago
- RCE PoC for Empire C2 framework <5.9.3☆29Updated last year
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆71Updated last year
- ☆42Updated last year
- Repo for all my exploits/PoCs☆53Updated 6 months ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆101Updated 5 months ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Updated 3 years ago
- 🌐 Modern, lightweight WireGuard VPN web ui panel with a beautiful UI.☆21Updated 8 months ago
- C++ Code to perform a MiniDump of lsass.exe☆35Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆36Updated 4 years ago
- Fortinet FortiClient EMS SQL Injection☆51Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆94Updated last year
- LiteSpeed Cache Privilege Escalation PoC☆18Updated last year