tezukanice / Office8570View external linksLinks
CVE20178570
☆95Aug 13, 2017Updated 8 years ago
Alternatives and similar repositories for Office8570
Users that are interested in Office8570 are comparing it to the libraries listed below
Sorting:
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67May 27, 2018Updated 7 years ago
- ☆11Apr 13, 2017Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆728Nov 19, 2017Updated 8 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆538Nov 29, 2017Updated 8 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆314Sep 10, 2018Updated 7 years ago
- Support x86 and x64☆66Apr 17, 2021Updated 4 years ago
- Running CVE-2017-8759 exploit sample.☆257Jan 23, 2020Updated 6 years ago
- Proof of Concept exploit for CVE-2017-8570☆185Jan 9, 2018Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- eqgrp-auction decrypted☆13Apr 15, 2017Updated 8 years ago
- Usage: python badtunnel.py wpad_server_ip☆62Jun 20, 2016Updated 9 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- ☆54Feb 27, 2017Updated 8 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆128Sep 16, 2022Updated 3 years ago
- ☆11Aug 1, 2016Updated 9 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service☆111Aug 21, 2018Updated 7 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆202Nov 30, 2017Updated 8 years ago
- 绕过burp破解版的截止日期限制. This is a tool to bypass the cracked version of the burpsuite_pro(Larry_Lau) certification deadline through time revers…☆23May 27, 2022Updated 3 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆747Dec 11, 2023Updated 2 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Jun 5, 2023Updated 2 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- The Demo for CVE-2018-1000006☆40Jan 25, 2018Updated 8 years ago
- MS17-010☆2,226Jun 20, 2023Updated 2 years ago
- CVE-2018-8120 Windows LPE exploit☆500May 30, 2018Updated 7 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 8 years ago
- Fox-scan is a initiative and passive SQL Injection vulnerable Test tools.☆407Oct 6, 2016Updated 9 years ago
- CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability☆332Dec 30, 2018Updated 7 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆168May 23, 2018Updated 7 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆11Mar 19, 2017Updated 8 years ago