TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.
☆20Mar 29, 2020Updated 5 years ago
Alternatives and similar repositories for cve-2020-9375
Users that are interested in cve-2020-9375 are comparing it to the libraries listed below
Sorting:
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- GoLismero web fingerprint population tool☆19Jul 30, 2013Updated 12 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Oct 17, 2018Updated 7 years ago
- python scripts☆15Dec 5, 2019Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 4 years ago
- Heimdall theme inspired from Microtech Hydra UI shown in Cyberpunk 2077☆16Aug 10, 2025Updated 7 months ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Array.prototype.slice wrong alias information.☆68Mar 25, 2019Updated 6 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆22Nov 9, 2021Updated 4 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Bluetooth device and service discovery tool that can be used for security assessment and penetration testing☆16Dec 15, 2015Updated 10 years ago
- 常用蓝牙漏洞CVE poc、EXP☆38Aug 22, 2018Updated 7 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- An async Python client library for Empire's RESTful API☆26Dec 6, 2023Updated 2 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Jan 9, 2018Updated 8 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Detects and extracts images from Goerli Testnet blockchain☆24Nov 25, 2021Updated 4 years ago
- Scripts to collect microcode from CPUMicrocodes Repo and to downgrade to a compatible microcode.☆22Oct 18, 2024Updated last year
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- ☆48Jul 7, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Aug 27, 2019Updated 6 years ago
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 5 years ago
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 7 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 5 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Apr 25, 2019Updated 6 years ago
- Some scripts for penetration testing☆30Dec 29, 2018Updated 7 years ago
- GitLab 12.9.0 Arbitrary File Read☆70Apr 23, 2021Updated 4 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- Project for Alike Backup, a BDR solution for XenServer, XCP-ng, and Hyper-V virtualization platforms☆12Sep 18, 2024Updated last year
- CVE-2020–14882 by Jang☆29Oct 29, 2020Updated 5 years ago
- ☆119Apr 14, 2020Updated 5 years ago
- Sensor software☆68Oct 14, 2021Updated 4 years ago
- Apache Tomcat Manager API WAR Shell Upload☆36Jul 9, 2020Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago