geeknik / cve-fuzzing-pocLinks
PoCs discovered through fuzzing which resulted in a CVE assignment.
☆18Updated 5 years ago
Alternatives and similar repositories for cve-fuzzing-poc
Users that are interested in cve-fuzzing-poc are comparing it to the libraries listed below
Sorting:
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Offline Security Focus Database☆31Updated 12 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- ☆12Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- module for certexfil☆15Updated 3 years ago
- ☆10Updated 9 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- ☆11Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆14Updated 6 years ago
- CVE-2019-12949☆26Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- "HeaderScan" Burp Plugin☆16Updated 11 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- ☆13Updated 5 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago