A tool for mapping cypher databases
☆16Jan 20, 2026Updated 2 months ago
Alternatives and similar repositories for cyphermap
Users that are interested in cyphermap are comparing it to the libraries listed below
Sorting:
- Spring Cloud Function Vulnerable Application / CVE-2022-22963☆19Apr 1, 2022Updated 3 years ago
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- A set of tools and resources for analysis of Havoc C2☆27Feb 27, 2024Updated 2 years ago
- ☆26Apr 24, 2025Updated 10 months ago
- Generate a unique ID, à la PHP☆13Mar 4, 2021Updated 5 years ago
- ☆28Dec 5, 2025Updated 3 months ago
- ☆16Jan 4, 2025Updated last year
- CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via craft…☆79Jun 11, 2024Updated last year
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/☆25May 1, 2024Updated last year
- GameOver(lay) Ubuntu Privilege Escalation☆133Oct 9, 2023Updated 2 years ago
- ☆29May 26, 2025Updated 9 months ago
- Program for fuzzing parameters web application☆15Apr 14, 2025Updated 11 months ago
- Gemini4IDA: Gemini for IDA disassembly and program analysis☆13Dec 29, 2023Updated 2 years ago
- HITB SECCONF CTF 2023. Developed with ❤️ by Hackerdom team and HITB.☆16Sep 6, 2023Updated 2 years ago
- Kerberoast with ACL abuse capabilities☆622Dec 16, 2024Updated last year
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- host碰撞工具☆13May 22, 2023Updated 2 years ago
- 递归寻找JS泄露的路径。Recursively search for the paths of JS Files.For pentest☆11Sep 30, 2024Updated last year
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- Precompiled executable☆63Feb 21, 2025Updated last year
- A tool for creating proxy dll for hijacking☆42Oct 28, 2024Updated last year
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆25Oct 2, 2023Updated 2 years ago
- 通过分离的方式免杀火绒☆12Dec 15, 2023Updated 2 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆14Jul 8, 2019Updated 6 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆29Sep 4, 2024Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆37Jul 27, 2025Updated 7 months ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- 123123☆16Dec 31, 2025Updated 2 months ago
- ☆19Jun 26, 2017Updated 8 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆169Jun 16, 2022Updated 3 years ago
- ldid and ldid2☆14Jun 25, 2018Updated 7 years ago
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Dec 8, 2022Updated 3 years ago
- GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)☆16May 9, 2024Updated last year
- A multithreaded Python3 program that fuzzes HTTP headers and values and outputs the results to a CSV file.☆21Jan 13, 2019Updated 7 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆364Feb 12, 2024Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆71Feb 3, 2021Updated 5 years ago