jfrog / cve-2024-3094-toolsLinks
☆44Updated last year
Alternatives and similar repositories for cve-2024-3094-tools
Users that are interested in cve-2024-3094-tools are comparing it to the libraries listed below
Sorting:
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- Hides message with invisible Unicode characters☆94Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- ☆135Updated last year
- ☆84Updated 2 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- Linpmem is a linux memory acquisition tool☆90Updated 3 months ago
- Utility to find hidden Linux kernel modules☆145Updated 2 months ago
- WallEscape vulnerability in util-linux☆52Updated last year
- Information for CVE-2024-3094☆54Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 9 months ago
- ☆97Updated last year
- ☆49Updated 7 months ago
- ☆101Updated last year
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated last year
- ☆12Updated 2 years ago
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆82Updated 3 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)☆71Updated last year
- ☆55Updated last year
- Example of CVE-2024-24576 use case.☆57Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 11 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆135Updated this week
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 8 months ago
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆73Updated last year
- Packet crafting, injection and sniffing tool☆69Updated 2 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 3 years ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆64Updated last year