☆23Oct 11, 2019Updated 6 years ago
Alternatives and similar repositories for CVEnotes
Users that are interested in CVEnotes are comparing it to the libraries listed below
Sorting:
- Metasploit reverse TCP stager fully undetectable☆18Nov 29, 2015Updated 10 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- 黑客神器,谁用谁知道!☆36Jul 10, 2019Updated 6 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- ☆13Oct 12, 2017Updated 8 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- 稳定多线程中的inline hook☆16Jun 19, 2019Updated 6 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- dump foxmail password 提取foxmail中存储的邮箱密码☆22Jan 26, 2018Updated 8 years ago
- C# .NET Assembly for interacting with File Object DACLs☆45Apr 3, 2020Updated 5 years ago
- ☆10May 23, 2019Updated 6 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- WebShell密码爆破工具☆19Mar 23, 2017Updated 8 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- record some AD security and Red Team contents☆14Dec 10, 2019Updated 6 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- PHPEB is a small tool that generates and stores obfuscated shellcode in user specified EXIF handlers.☆80Apr 17, 2017Updated 8 years ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- Bug Hunter/Red Team/Yellow Team/Blue Team/Green Team/Cyan Team/Purple Team/Operations/Security Research Asset Collection & Scanning Platf…☆25Feb 9, 2026Updated 2 weeks ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- ☆32Jun 10, 2020Updated 5 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)☆77Oct 1, 2020Updated 5 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- 能过卡巴、核晶、defender等杀软的dump lsass进程工具☆12Sep 25, 2022Updated 3 years ago
- A simple parser(library) which extracts shimcache data from windows.☆15May 20, 2019Updated 6 years ago
- Beef hook OWA / Outlook☆12Mar 27, 2019Updated 6 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418☆35Mar 21, 2019Updated 6 years ago
- Papers☆34Oct 29, 2019Updated 6 years ago