PowerShell module for the exploitation and testing
☆16Jul 5, 2015Updated 10 years ago
Alternatives and similar repositories for MS15034
Users that are interested in MS15034 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pgp.ustc.edu.cn deployment☆10Mar 25, 2019Updated 7 years ago
- 一款基于subDomainsBrute子域名爆破工具结果的处理脚本☆10Jul 28, 2017Updated 8 years ago
- English language translation of gentilkiwi's early mimikatz release☆58Dec 30, 2014Updated 11 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- Ansible Automatic deployment Mattermost on Linux☆10Jan 4, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 12 years ago
- Host files with DNS☆32Mar 1, 2016Updated 10 years ago
- 专为 devops 而生,30s 内部署一个生产级别的应用,通过 web 部署 helm 应用。☆19Mar 11, 2026Updated last month
- The frontend for Aurora Admin Panel☆14Apr 21, 2022Updated 4 years ago
- Materials for OWASP presentation on malicious JavaScript☆16Aug 30, 2010Updated 15 years ago
- nodequery-server nodejs version☆14Jan 19, 2021Updated 5 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Security tools to use on assessments.☆41May 9, 2016Updated 9 years ago
- 让微信、QQ、支付宝和淘宝支持使用指纹支付☆22Mar 18, 2018Updated 8 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- Burp Extension to manipulate AES encrypted payloads☆24Aug 2, 2017Updated 8 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Sep 1, 2020Updated 5 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- ☆19Jan 7, 2023Updated 3 years ago
- ☆91Feb 22, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- 中文版渗透报告生成系统-Serpico☆26Jun 27, 2016Updated 9 years ago
- Burp Intruder File Payload Generator☆18Oct 27, 2019Updated 6 years ago
- Middleware of shadowsocks-libev and sspanel☆43Mar 25, 2021Updated 5 years ago
- PentestBox Tools Website☆29Jul 21, 2016Updated 9 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Mar 28, 2020Updated 6 years ago
- 个人博客,记录和分享我的一些经验、想法和作品☆27Oct 8, 2025Updated 6 months ago
- ☆57Aug 7, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆68Apr 20, 2016Updated 10 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- 极光验证码,为反爬虫而生☆26Apr 27, 2020Updated 6 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 12 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago