PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610
☆78Jan 31, 2020Updated 6 years ago
Alternatives and similar repositories for BlueGate
Users that are interested in BlueGate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bypassing NTFS permissions to read any files as unprivileged user.☆191Oct 21, 2020Updated 5 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 11 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 8 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆39Jul 15, 2021Updated 4 years ago
- 一款用于记录终端软件使用时间的开发套件☆12Feb 26, 2022Updated 4 years ago
- Zerokit shared code☆18Mar 28, 2019Updated 7 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 6 years ago
- 无模块注入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Analysis and Modification Tool for Executables☆18Mar 28, 2019Updated 7 years ago
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Dec 20, 2017Updated 8 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆11Jun 26, 2024Updated last year
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- ☆36Sep 7, 2020Updated 5 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 6 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Jul 10, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- Collection of shellcode injection and execution techniques☆16Mar 17, 2026Updated 2 months ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Jul 24, 2016Updated 9 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆12Jun 17, 2020Updated 5 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- lz77win sources!lz77 is the compression software for the windows platform.☆24Apr 16, 2019Updated 7 years ago
- ☆14Nov 24, 2017Updated 8 years ago
- ☆29Sep 5, 2025Updated 8 months ago
- User-mode part of Zerokit platform☆23Mar 30, 2019Updated 7 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 6 months ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆58Mar 13, 2020Updated 6 years ago