jfrog / cve-2024-3094-tools
☆38Updated 9 months ago
Alternatives and similar repositories for cve-2024-3094-tools:
Users that are interested in cve-2024-3094-tools are comparing it to the libraries listed below
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆143Updated 9 months ago
- ☆12Updated 2 years ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆40Updated 7 months ago
- A feed of malware samples curated from threat intelligence sources.☆25Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆129Updated 8 months ago
- PoC for CVE-2024-48990☆97Updated 2 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆38Updated 11 months ago
- Detection and sanitization for Acropalypse Now - CVE-2023-21036☆79Updated last year
- Information for CVE-2024-3094☆52Updated 9 months ago
- Script to chain search parameters for MalwareBazaar☆9Updated this week
- hiding in plain sight: part 2☆44Updated 6 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆122Updated 3 months ago
- ☆14Updated 2 months ago
- Graphical interface for PortEx, a Portable Executable and Malware Analysis Library☆133Updated 6 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆51Updated last month
- Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)☆17Updated 5 months ago
- ☆130Updated 9 months ago
- In-Memory Rootkit For Linux☆70Updated 3 months ago
- Example of CVE-2024-24576 use case.☆56Updated 9 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆22Updated 10 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆84Updated 3 months ago
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆31Updated 2 months ago
- this repo is for red team process and tools collection☆18Updated 3 years ago
- ☆24Updated 2 years ago
- Public repository containing materials for various malware-related streams.☆34Updated 2 weeks ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆20Updated 7 months ago
- A delicious, but malicious SSL-VPN server 🌮☆200Updated 2 months ago
- ☆47Updated 8 months ago