soufianetahiri / Anxun-isoonLinks
I-SOON/Anxun leak related stuff
☆330Updated last year
Alternatives and similar repositories for Anxun-isoon
Users that are interested in Anxun-isoon are comparing it to the libraries listed below
Sorting:
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆848Updated last year
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆389Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆757Updated last year
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,431Updated last year
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,463Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,299Updated 6 months ago
- A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities☆1,690Updated last year
- Microsoft Security Copilot is a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders …☆602Updated 5 months ago
- Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram API integration. Offering precise…☆2,456Updated 11 months ago
- Exploit PoC for CVE-2024-32002☆532Updated last year
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆384Updated last year
- The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and eng…☆3,380Updated this week
- Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487☆241Updated 2 years ago
- PoC for CVE-2023-4911☆388Updated 2 years ago
- For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.☆3,487Updated last week
- ☆453Updated last year
- An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents☆1,111Updated last month
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆782Updated 2 years ago
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆992Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆816Updated 11 months ago
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,045Updated last year
- Cyber Security Trainings☆321Updated 2 years ago
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,536Updated last year
- PasteBomb C2-less RAT☆318Updated 3 months ago
- OSCP Cheat Sheet☆3,622Updated last week
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- Lockbit, URSIF, BlackBasta etc.☆221Updated 3 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Updated last year
- Yet another Ransomware gang tracker☆557Updated last week
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,086Updated 7 months ago