Demo of a malicious python package that will run code upon pip download or install
☆29Sep 10, 2022Updated 3 years ago
Alternatives and similar repositories for this_is_fine_wuzzi
Users that are interested in this_is_fine_wuzzi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC for CVE-2021-41091☆65May 20, 2023Updated 2 years ago
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 2 years ago
- 本来不屑于看面试题的,直到碰到大聪明面试官问的大聪明问题,所以就爬了一份,欢迎PR,一起维护一个。☆27Sep 12, 2025Updated 6 months ago
- eval() Exploit POC for Searchor 2.4.2 and lower☆11Apr 10, 2023Updated 2 years ago
- ☆29Oct 15, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A PowerShell module for exporting, importing, removing, permissioning, publishing Active Directory Certificate Templates. It also include…☆96Jul 2, 2024Updated last year
- Pwning Sudo Rules☆29Mar 3, 2022Updated 4 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆25Feb 13, 2022Updated 4 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 3 months ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆27May 8, 2023Updated 2 years ago
- CVE-2023-2255 Libre Office☆64Jul 10, 2023Updated 2 years ago
- ☆67Aug 26, 2021Updated 4 years ago
- ☆16Mar 26, 2024Updated 2 years ago
- ☆12Jul 13, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Code for our 2023 IEEE S&P Paper "The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web"☆14Dec 12, 2024Updated last year
- Precompiled executable☆64Feb 21, 2025Updated last year
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Find secrets on any machine from over 120 Different Signatures.☆48Aug 16, 2024Updated last year
- 泛微E-Office文件上传漏洞(CNVD-2021-49104)☆10Nov 27, 2021Updated 4 years ago
- ☆17Oct 4, 2021Updated 4 years ago
- SSTI Payload Generator☆93Aug 8, 2022Updated 3 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆130Sep 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python default webserver as an windows executable☆18Jan 20, 2018Updated 8 years ago
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆60Dec 10, 2022Updated 3 years ago
- 优化了GetSystemEarlyBird的代码结构☆21Jun 24, 2020Updated 5 years ago
- ☆51May 18, 2022Updated 3 years ago
- Chinese mirror of Tryhackme tutorials☆16Dec 11, 2025Updated 3 months ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- protostar docker version☆14Dec 23, 2020Updated 5 years ago
- 💀 Linux local root exploit for CVE-2018-18955☆22Jan 20, 2022Updated 4 years ago
- Username tools for penetration testing☆1,347Sep 20, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆15May 18, 2023Updated 2 years ago
- Pentest automation resources for Burp☆15Mar 10, 2024Updated 2 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated last month
- GameOver(lay) Ubuntu Privilege Escalation☆133Oct 9, 2023Updated 2 years ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- Detect and bypass Istio sidecar☆21Sep 24, 2021Updated 4 years ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆50Feb 23, 2026Updated last month