jfrog / cve-2024-3094-toolsLinks
☆40Updated last year
Alternatives and similar repositories for cve-2024-3094-tools
Users that are interested in cve-2024-3094-tools are comparing it to the libraries listed below
Sorting:
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆143Updated last year
- ☆134Updated last year
- ☆95Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated 6 months ago
- ☆82Updated last year
- ☆99Updated last year
- Example of CVE-2024-24576 use case.☆57Updated last year
- Hides message with invisible Unicode characters☆94Updated 9 months ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- Information for CVE-2024-3094☆53Updated last year
- A targeted DNS cache poisoner☆121Updated 2 years ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆87Updated last year
- In-Memory Rootkit For Linux☆71Updated last month
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated last year
- PoC for CVE-2024-48990☆98Updated 8 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆67Updated 7 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆160Updated 3 months ago
- hiding in plain sight: part 2☆45Updated last year
- ☆44Updated 4 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 months ago
- A delicious, but malicious SSL-VPN server 🌮☆237Updated last month
- Make BASH stealthy and hacker friendly with lots of bash functions☆259Updated 2 weeks ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 8 months ago
- Turn binaries into music☆50Updated last year
- Hardened your Windows OS against forensics analysis☆21Updated 7 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆83Updated 4 months ago
- Public repository containing materials for various malware-related streams.☆36Updated last week
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago