Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux
☆26Jan 19, 2022Updated 4 years ago
Alternatives and similar repositories for MZ-21-02-Trendmicro
Users that are interested in MZ-21-02-Trendmicro are comparing it to the libraries listed below
Sorting:
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated 11 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- ☆12Jul 29, 2019Updated 6 years ago
- OSINT tool to find info about your old pages.☆19Mar 19, 2022Updated 3 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25May 5, 2022Updated 3 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated last month
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- Apache Druid 任意文件读取☆33Oct 15, 2021Updated 4 years ago
- pocsuite3 poc&exp☆24Apr 9, 2025Updated 10 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- ☆26Dec 17, 2021Updated 4 years ago
- PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)☆71Oct 14, 2021Updated 4 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆306Feb 26, 2022Updated 4 years ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.2☆69Feb 17, 2026Updated 2 weeks ago
- ☆41Mar 12, 2025Updated 11 months ago
- Research browsers☆48Jan 9, 2026Updated last month
- ☆216Mar 29, 2024Updated last year
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- QRSS Plus: live QRSS grabbers from around the world☆10Feb 9, 2026Updated 3 weeks ago
- Bot per leggere i livelli idrometrici dei fiumi dell'Emilia Romagna riportati da allertameteo.regione.emilia-romagna.it.☆12Updated this week
- ☆37Sep 28, 2021Updated 4 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- CVE-2022-24086 about Magento RCE☆36Dec 16, 2022Updated 3 years ago
- 致远OA综合利用工具V1.0☆36Jul 7, 2021Updated 4 years ago
- Tool for advanced mining for content on Github☆28Nov 11, 2025Updated 3 months ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- ☆14Aug 18, 2023Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆85Dec 22, 2025Updated 2 months ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- archives for Tongji CTF 2017☆10Oct 25, 2023Updated 2 years ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆28Updated this week
- Import a Disqus XML export into WordPress☆10Jan 7, 2016Updated 10 years ago