soufianetahiri / Anxun-isoonLinks
I-SOON/Anxun leak related stuff
☆328Updated last year
Alternatives and similar repositories for Anxun-isoon
Users that are interested in Anxun-isoon are comparing it to the libraries listed below
Sorting:
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆847Updated last year
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆623Updated last month
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆751Updated last year
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆384Updated last year
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,423Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,293Updated 4 months ago
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,437Updated last year
- A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities☆1,680Updated last year
- Exploit PoC for CVE-2024-32002☆532Updated last year
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆384Updated last year
- Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487☆243Updated last year
- Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram API integration. Offering precise…☆2,459Updated 9 months ago
- PoC for CVE-2023-4911☆387Updated 2 years ago
- ☆453Updated last year
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆990Updated last year
- ☆716Updated last year
- Black Hat Asia 2023 PDF Public☆579Updated 2 years ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,228Updated this week
- ☆1,560Updated last month
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,077Updated 6 months ago
- All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.☆3,396Updated this week
- Collection of forensic tools☆679Updated 7 months ago
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,535Updated last year
- SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the r…☆337Updated 10 months ago
- The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.☆325Updated 5 months ago
- Yet another Ransomware gang tracker☆544Updated this week
- Official Pytorch repository for Extreme Compression of Large Language Models via Additive Quantization https://arxiv.org/pdf/2401.06118.p…☆1,309Updated 4 months ago
- Information for CVE-2024-3094☆54Updated last year
- An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents☆1,083Updated last week
- PasteBomb C2-less RAT☆318Updated 2 months ago