puckiestyle / CVE-2023-0386View external linksLinks
☆12Dec 23, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-0386
Users that are interested in CVE-2023-0386 are comparing it to the libraries listed below
Sorting:
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆16Jun 22, 2025Updated 7 months ago
- picoCTF 2023 Writeup (Capture the Flag Competition) with the solutions for the challenges.☆10Jul 20, 2023Updated 2 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- The Process Watchdog is a Linux-based utility designed to start, monitor and manage processes specified in a configuration file. It ensur…☆11Dec 27, 2025Updated last month
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- Generate a unique ID, à la PHP☆13Mar 4, 2021Updated 4 years ago
- SAOL wordlist 2018☆12Dec 8, 2022Updated 3 years ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 5 months ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Jan 19, 2026Updated 3 weeks ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 4 months ago
- Basic Machine Learning and Deep Learning☆11Oct 4, 2021Updated 4 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Jul 9, 2025Updated 7 months ago
- FiveM☆10Jan 18, 2022Updated 4 years ago
- A Flutter application to demonstrate Abushakir dart package.☆13Dec 31, 2020Updated 5 years ago
- A lightweight component for rendering a basic funnel chart.☆12Dec 18, 2023Updated 2 years ago
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆36Jan 13, 2026Updated last month
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆12Jun 3, 2025Updated 8 months ago
- My Gen AI research☆11Jun 3, 2024Updated last year
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- Osint tool to recover authors and emails on GitHub☆15Jul 2, 2025Updated 7 months ago
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆60Feb 5, 2026Updated last week
- Awesome repository for Bittensor's Subnet 43. Join us in graphing the future.☆14Oct 12, 2025Updated 4 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- Helpful Machine Learning resources for the Zindi community☆15Aug 26, 2023Updated 2 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- A collection of scripts to explore domains and pick up information.☆13Sep 17, 2018Updated 7 years ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆21Jan 7, 2026Updated last month
- ☆12Apr 6, 2021Updated 4 years ago
- ☆15Oct 13, 2024Updated last year
- Simple reimplementation of ETC and GC in dart.☆14Mar 20, 2024Updated last year
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- A Python module intended to make cell segmentation, tracking and subsequent (mostly biophysical) statisticial analysis easy☆17Apr 23, 2025Updated 9 months ago
- Program for fuzzing parameters web application☆15Apr 14, 2025Updated 10 months ago
- auto farm for mir4 // script☆17Oct 13, 2024Updated last year
- Multiple Brute Force XMLRPC [Wordpress]☆14Jun 27, 2022Updated 3 years ago
- A Chrome extension for hiding the feed on Youtube.com☆17Aug 3, 2022Updated 3 years ago
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆44Nov 19, 2025Updated 2 months ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 9 months ago
- Python3 MySQL brute force script.☆15Jul 12, 2020Updated 5 years ago