vanhoefm / vpnleaks
☆77Updated last year
Related projects ⓘ
Alternatives and complementary repositories for vpnleaks
- quicmap is a simple yet quic (!) QUIC protocol scanner☆81Updated 8 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 6 months ago
- Manjaro LPE☆35Updated last year
- ☆36Updated 6 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆41Updated last year
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 weeks ago
- ☆79Updated last year
- All kinds of tiny shells☆59Updated last year
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆40Updated 2 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆107Updated 2 years ago
- Still point in moving world.☆50Updated 2 years ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆83Updated this week
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆84Updated 6 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆19Updated 2 years ago
- DEbian Cve REproducer Tool☆22Updated last year
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆29Updated 10 months ago
- masscan with exclusive excludes☆55Updated last year
- JA4TScan is an active TCP server fingerprinting tool.☆56Updated 2 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆42Updated last year
- A go-exploit to scan for implanted Cisco IOS XE Systems☆38Updated 3 weeks ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆121Updated 3 weeks ago
- A list of public attacks on BitLocker☆181Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆57Updated 5 months ago
- ☆55Updated last month
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆19Updated 2 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆32Updated 2 months ago