soufianetahiri / Anxun-isoon
I-SOON/Anxun leak related stuff
☆301Updated 11 months ago
Alternatives and similar repositories for Anxun-isoon:
Users that are interested in Anxun-isoon are comparing it to the libraries listed below
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆724Updated last year
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆538Updated 3 months ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated 10 months ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆341Updated 10 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,028Updated 6 months ago
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,123Updated 11 months ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,346Updated 10 months ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆962Updated 11 months ago
- Differential fuzzing REPL for HTTP implementations.☆773Updated this week
- A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities☆1,519Updated 3 months ago
- Microsoft Security Copilot is a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders …☆496Updated this week
- Galah: An LLM-powered web honeypot.☆491Updated 4 months ago
- ☆670Updated 7 months ago
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,502Updated 10 months ago
- LLM powered fuzzing via OSS-Fuzz.☆1,096Updated this week
- ☆1,927Updated 9 months ago
- Yet another Ransomware gang tracker☆377Updated this week
- PoC for CVE-2023-4911☆384Updated last year
- Navigate the CVE jungle with ease.☆1,847Updated this week
- A Onion websites searcher☆270Updated last month
- Collection of forensic tools☆559Updated last year
- Binary Risk Intelligence☆150Updated 10 months ago
- Black Hat Asia 2023 PDF Public☆575Updated last year
- Automating Host Exploitation with AI☆532Updated 2 years ago
- Conference presentation slides☆1,682Updated this week
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆751Updated last year
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,152Updated this week
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆975Updated this week
- SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the r…☆314Updated 2 weeks ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year