Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.
☆45Feb 10, 2026Updated 2 months ago
Alternatives and similar repositories for CVE-2025-53770
Users that are interested in CVE-2025-53770 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- ☆17Jul 16, 2024Updated last year
- ☆15May 3, 2024Updated last year
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆18Oct 3, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Multilayered secret detection tool☆42Feb 11, 2026Updated 2 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- A frightfully intelligent algorithmic trading automaton of noble birth. Sir Reginald's prime directive: to acquire undervalued assets pos…☆42Sep 18, 2025Updated 6 months ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 9 months ago
- ☆77Jan 27, 2025Updated last year
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆24Apr 8, 2026Updated last week
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆53Jan 11, 2025Updated last year
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆36Jan 7, 2026Updated 3 months ago
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Dec 9, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024☆12Nov 26, 2024Updated last year
- Official code for the paper "Adversarial Magnification to Deceive Deepfake Detection through Super Resolution"☆12Jun 26, 2023Updated 2 years ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆34Oct 3, 2025Updated 6 months ago
- 🧹 m2ts ファイルを作品ごとにシンボリックリンクを作成し, 整理します☆11Mar 31, 2026Updated 2 weeks ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- This repo collects nuclei template from 600+ github repos, updates every 6 hours.☆36Feb 17, 2026Updated last month
- ☆47Dec 28, 2025Updated 3 months ago
- MongoDB CVE-2025-14847 Heap Memory Leak Scanner | OP_COMPRESSED zlib Vulnerability | Bug Bounty & Red Team Tool☆35Dec 28, 2025Updated 3 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆78Sep 8, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- Squid SSL Proxy with SSL Bump for intercepting SSL traffic☆10Sep 10, 2025Updated 7 months ago
- SSH authentication with the GitHub team and repo☆10Apr 6, 2026Updated last week
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆12May 25, 2025Updated 10 months ago
- Collection of notes and scripts I used during my OSCP exam preparation.☆42Dec 21, 2025Updated 3 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 8 months ago
- Tverにもニコニコ実況のコメントを流したい☆13Apr 17, 2025Updated 11 months ago
- Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)☆11Jan 22, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An essential collection of 42 School curriculum project PDFs in English and French, thoughtfully organized for students navigating the co…☆19Dec 10, 2023Updated 2 years ago
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆18Jun 28, 2025Updated 9 months ago
- ☆15Feb 6, 2025Updated last year
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated 3 weeks ago
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- Tools for Open-WebUI☆25May 14, 2025Updated 11 months ago
- OAuth2 implementation for echo framework☆16Jan 31, 2024Updated 2 years ago