☆19Jan 10, 2024Updated 2 years ago
Alternatives and similar repositories for gcm-exploit
Users that are interested in gcm-exploit are comparing it to the libraries listed below
Sorting:
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆42Jan 14, 2024Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2024-23897☆16Apr 16, 2024Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆15Dec 18, 2023Updated 2 years ago
- A guide to silicon reverse engineering by optical microscophy☆14Dec 27, 2024Updated last year
- ☆11Feb 24, 2025Updated last year
- Tool to automate data collection with local storage, and some basic data analysis of telegram channels☆16Apr 20, 2024Updated last year
- ☆14Aug 7, 2023Updated 2 years ago
- CVE-2023-6875 PoC☆25Jan 15, 2024Updated 2 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Exploit Host Connectivity Checker☆21Jan 7, 2024Updated 2 years ago
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 9 months ago
- The UI Automation COM-to-.NET Adapter makes it possible to use the new Windows Automation API 3.0 COM interfaces, with their improved rel…☆12Jan 3, 2019Updated 7 years ago
- A progressively enhanced server-rendered form-aware web component counter using WebC☆12Aug 26, 2025Updated 6 months ago
- PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.☆24Aug 28, 2025Updated 6 months ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Design materials for Dark Reader☆13Dec 19, 2021Updated 4 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- Dark Reader website production files☆15Feb 10, 2026Updated last month
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆32Jan 3, 2024Updated 2 years ago
- !!Bang!! - A text processor and static website generator. Bang lets you put holes through text files!☆12Aug 10, 2024Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- Decrypt Nanocore RAT configuration☆10Mar 11, 2017Updated 9 years ago
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Apr 18, 2024Updated last year
- Redirect spawned iOS application stdout and stderr to pty☆30Jan 29, 2025Updated last year
- DIY security toolset for Cisco's Packet Tracer (version7.2)☆15Aug 17, 2021Updated 4 years ago
- Manage firewalld configuration using Ansible☆15May 27, 2020Updated 5 years ago
- An implementation of ZKBoo☆33May 10, 2022Updated 3 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)☆51Oct 12, 2023Updated 2 years ago
- ☆11Updated this week
- SPI MITM for the Arty S7-50☆14Dec 24, 2022Updated 3 years ago
- Useful JS files for certain websites.☆14Nov 5, 2025Updated 4 months ago
- WIP; specification of a format for communicating streams of HTTP requests and responses☆14Mar 29, 2024Updated last year
- Pine: Machine Learning Prediction As A Service☆18Feb 28, 2017Updated 9 years ago
- A web app that makes it easy to search for Muscogee (Creek) words☆11Dec 10, 2022Updated 3 years ago
- Collection of awesome SEO-related case studies☆16Nov 28, 2020Updated 5 years ago
- Converts images and video to emoji pixels.☆15Oct 5, 2021Updated 4 years ago