soez / cryptovenom
Cryptovenom: The Cryptography Swiss Army Knife
☆9Updated 5 years ago
Alternatives and similar repositories for cryptovenom:
Users that are interested in cryptovenom are comparing it to the libraries listed below
- Simple WebSocket fuzzer☆32Updated last year
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- some sploits☆17Updated 7 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆52Updated 3 months ago
- OSED Practice binary☆24Updated last year
- A python-based padding oracle tool☆20Updated 8 months ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- ☆18Updated last year
- Malware Analysis tools☆26Updated 7 months ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- ☆23Updated 3 years ago
- PoC☆11Updated 2 weeks ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- Proof of Concept for WatchGuard Authenticated Arbitrary File Read (CVE-2022-31749)☆10Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 11 months ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆16Updated 11 months ago
- PoC for CVE-2020-11651☆6Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 3 months ago
- Noob Penetration tester☆11Updated 11 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆40Updated 4 months ago
- ☆9Updated 11 months ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- ☆20Updated 2 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- ☆16Updated 11 months ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆46Updated 3 years ago
- A little implant which SSH's back with a shell☆37Updated 3 years ago
- Searching .evtx logs for remote connections☆23Updated last year