jfrog / cve-2024-3094-toolsLinks
☆39Updated last year
Alternatives and similar repositories for cve-2024-3094-tools
Users that are interested in cve-2024-3094-tools are comparing it to the libraries listed below
Sorting:
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆53Updated 5 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆67Updated 6 months ago
- ☆55Updated 8 months ago
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆142Updated last year
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Rebuild of portspoof in GO with additional features.☆18Updated this week
- Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)☆17Updated 10 months ago
- PoC for CVE-2024-48990☆98Updated 7 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆14Updated 6 months ago
- Hardened your Windows OS against forensics analysis☆21Updated 7 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- Hides message with invisible Unicode characters☆94Updated 8 months ago
- A tool to dump exposed .git repositories☆70Updated 3 weeks ago
- Example of CVE-2024-24576 use case.☆57Updated last year
- Volatility Symbol Generator for Linux Kernels☆35Updated last year
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆27Updated last year
- hiding in plain sight: part 2☆45Updated 11 months ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆17Updated 6 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆64Updated last month
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- A delicious, but malicious SSL-VPN server 🌮☆233Updated 2 weeks ago
- Volatility, on Docker 🐳☆34Updated 2 months ago
- ☆95Updated last year
- ☆50Updated last year
- ☆44Updated 4 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- ☆30Updated 7 months ago
- THOR APT Scanner User Manual☆18Updated last week
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆12Updated 8 months ago