ebrasha / abdal-anydesk-remote-ip-detector
CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.
☆35Updated 4 months ago
Alternatives and similar repositories for abdal-anydesk-remote-ip-detector:
Users that are interested in abdal-anydesk-remote-ip-detector are comparing it to the libraries listed below
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆41Updated last year
- Small collection of Active Directory pentesting tools.☆29Updated last year
- APK Infrastructure Investigator☆62Updated last year
- Repo for all my exploits/PoCs☆50Updated last month
- execute PE in memory Filelessly☆32Updated last month
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated 10 months ago
- RCE PoC for Empire C2 framework <5.9.3☆26Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆34Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- ☆12Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 7 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆74Updated last month
- ☆58Updated last year
- Make an Linux Kernel rootkit visible again.☆49Updated last month
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 9 months ago
- ☆13Updated 2 weeks ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Updated last month
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆53Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆27Updated 5 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- ☆13Updated 11 months ago
- Kali Packerge Manager☆59Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year