theart42 / cvesLinks
CVE's we discovered along the way
☆17Updated 4 years ago
Alternatives and similar repositories for cves
Users that are interested in cves are comparing it to the libraries listed below
Sorting:
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆14Updated 6 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Updated 2 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆23Updated 4 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Updated 3 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 4 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Updated 5 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Updated 4 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- Local Privilege Escalation Miner☆29Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- ☆58Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 9 months ago
- Offensive tool to trigger network authentications as SYSTEM☆143Updated 3 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 5 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Random Exploits☆50Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- ☆122Updated 2 years ago
- ☆33Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago