investlab / RAT-PythonLinks
☆10Updated 8 years ago
Alternatives and similar repositories for RAT-Python
Users that are interested in RAT-Python are comparing it to the libraries listed below
Sorting:
- Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)☆138Updated 6 years ago
- 📕NVD Database☆113Updated this week
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆100Updated 4 years ago
- Source code for the Mirai botnet - Not going anywhere anytime soon☆55Updated 9 years ago
- Cisco IOS Exploit Framework☆22Updated 5 years ago
- CVE-2021-41773 playground☆210Updated 4 years ago
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆106Updated 5 years ago
- ClamAV_0Day_exploit☆89Updated 6 years ago
- ☆33Updated 7 years ago
- Linux kernel exploits for local privilege escalation☆81Updated 7 years ago
- 2020年发布到阿尔法实验室微信公众号的所有安全资讯汇总☆40Updated 4 years ago
- All Security Resource Collections Repos That I Published.☆128Updated 5 years ago
- Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166☆19Updated 4 years ago
- CVE-2021-3156☆111Updated 4 years ago
- Universal Linux LKM rootkit, designed to work in any kernel version and both architectures (i686 and x86_64).☆50Updated last year
- A collection of SSL/TLS security related resources.☆55Updated 11 months ago
- Additional resources and references for linux-exploit-suggester.sh☆30Updated 5 years ago
- CVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!☆227Updated 6 years ago
- PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github☆61Updated 4 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Updated 5 years ago
- A Docker image with four popular Java decompilers in one place (CFR, Fernflower, Krakatau, and Procyon)☆75Updated 3 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆189Updated last year
- CVE-2020-????☆106Updated 5 years ago
- Cisco ASA Software and ASDM Security Research☆85Updated 3 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆79Updated 7 months ago
- Router Vulnerabilities Scanner☆14Updated 5 years ago
- a very very fast brute force webshell password tool☆44Updated 5 years ago
- Resources About Shellcode☆215Updated 5 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆45Updated 2 years ago
- Security Research☆94Updated 5 months ago