☆19Jan 10, 2024Updated 2 years ago
Alternatives and similar repositories for gcm-exploit
Users that are interested in gcm-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22527 leads to RCE☆10Jan 23, 2024Updated 2 years ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆42Jan 14, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆15Dec 18, 2023Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2024-23897☆17Apr 16, 2024Updated 2 years ago
- A guide to silicon reverse engineering by optical microscophy☆14Dec 27, 2024Updated last year
- ☆11Feb 24, 2025Updated last year
- Tool to automate data collection with local storage, and some basic data analysis of telegram channels☆16Apr 20, 2024Updated 2 years ago
- A BOF/COFF loader implemented in Go and CGO.☆23Jan 16, 2024Updated 2 years ago
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆23Jan 17, 2024Updated 2 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploit Host Connectivity Checker☆21Jan 7, 2024Updated 2 years ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 10 months ago
- The UI Automation COM-to-.NET Adapter makes it possible to use the new Windows Automation API 3.0 COM interfaces, with their improved rel…☆12Jan 3, 2019Updated 7 years ago
- Design materials for Dark Reader☆13Dec 19, 2021Updated 4 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 5 months ago
- Dark Reader website production files☆14Apr 10, 2026Updated 3 weeks ago
- ☆12Mar 16, 2025Updated last year
- Calculate any index of the Cartesian Product of any number of sequences in no time!☆10Oct 12, 2020Updated 5 years ago
- Make your Batchfiles unreadable.☆10Dec 29, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool to generate fancy animated library cards for use with Jellyfin's UI.☆37Apr 21, 2025Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- Decrypt Nanocore RAT configuration☆10Mar 11, 2017Updated 9 years ago
- DIY security toolset for Cisco's Packet Tracer (version7.2)☆15Aug 17, 2021Updated 4 years ago
- Manage firewalld configuration using Ansible☆16May 27, 2020Updated 5 years ago
- Redirect spawned iOS application stdout and stderr to pty☆31Jan 29, 2025Updated last year
- SCIM AST filter parser PHP library☆11Sep 19, 2024Updated last year
- helper tool to trace nftables rulesets☆29Mar 5, 2025Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- WIP; specification of a format for communicating streams of HTTP requests and responses☆14Mar 29, 2024Updated 2 years ago
- Converts images and video to emoji pixels.☆15Oct 5, 2021Updated 4 years ago
- ☆10Jul 14, 2022Updated 3 years ago
- A mini-player/viewer for Spotify that gives you the information you want but in a smaller windowed package.☆13Dec 8, 2022Updated 3 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated last year
- Preprocessor based on esbuild for the karma test runner☆22Nov 6, 2023Updated 2 years ago
- Example application for FlatBuffers☆14Oct 27, 2015Updated 10 years ago