Detection for CVE-2025-61882 & CVE-2025-61884
☆36Oct 14, 2025Updated 5 months ago
Alternatives and similar repositories for CVE-2025-61882-CVE-2025-61884
Users that are interested in CVE-2025-61882-CVE-2025-61884 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Google Workspace password sprayer with anti-captcha☆14Mar 11, 2026Updated 2 weeks ago
- Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration☆12Jun 2, 2024Updated last year
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Nov 12, 2024Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)☆49Oct 2, 2024Updated last year
- Detection for CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039☆47Dec 15, 2025Updated 3 months ago
- A lightweight and simple directory buster.☆16Sep 9, 2023Updated 2 years ago
- ☆17Oct 15, 2024Updated last year
- ☆20Feb 1, 2026Updated last month
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆27Jan 31, 2026Updated last month
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆36Jan 31, 2026Updated last month
- ☆52Oct 1, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- TapJacking Attacks Demo☆20Apr 25, 2021Updated 4 years ago
- Raven is a powerful and customizable web crawler written in Go.☆41Sep 3, 2024Updated last year
- shellcode transformation tool for YARA evasion☆58Dec 17, 2025Updated 3 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆93Jul 15, 2025Updated 8 months ago
- Top passwords as per HaveIBeenPwned☆33Mar 12, 2026Updated 2 weeks ago
- PoC for CVE-2024-42327 / ZBX-25623☆18Dec 3, 2024Updated last year
- An advanced networking tool for penetration testing... A place where floats and integers always win.☆31Aug 18, 2025Updated 7 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 3 months ago
- ☆13Mar 6, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆31Feb 13, 2026Updated last month
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆12May 25, 2025Updated 10 months ago
- An open-source .NET Ransomware☆22Aug 2, 2021Updated 4 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Jan 29, 2024Updated 2 years ago
- PhoneFy un simple script para obtener informacion de un telefono☆11Nov 5, 2021Updated 4 years ago
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆76Mar 23, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆16Jul 10, 2025Updated 8 months ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- ☆51Nov 26, 2025Updated 4 months ago
- Collection of my talks and workshops about hacking & cybersecurity☆28Feb 28, 2025Updated last year
- Design + Code for kelsanford.design☆11Jul 1, 2015Updated 10 years ago
- vshell 是一款go编写的主机管理工具,使用蚁剑控制台及插件管理主机 vshell is a Remote Administation tool written in Go (RAT),use AntSword control host☆32Dec 5, 2023Updated 2 years ago