xaitax / CVE-2024-6387_Check
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
☆458Updated last month
Related projects ⓘ
Alternatives and complementary repositories for CVE-2024-6387_Check
- a signal handler race condition in OpenSSH's server (sshd)☆461Updated 4 months ago
- This repository presents a proof-of-concept of CVE-2023-7028☆236Updated 10 months ago
- MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc☆108Updated 3 months ago
- ☆332Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆781Updated this week
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆625Updated 2 months ago
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆233Updated 5 months ago
- CVE-2024-23897☆193Updated 9 months ago
- Official Kali Linux tool to check all urls of a domain for SQL injections :)☆258Updated 5 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆552Updated 2 weeks ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆201Updated last week
- Invisible network protocol sniffer☆723Updated 3 months ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆687Updated 9 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆315Updated 6 months ago
- ☆493Updated 7 months ago
- Nmap Dashboard Mini Project☆540Updated 5 months ago
- Harvest passwords automatically from OpenSSH server☆358Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆431Updated last month
- 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc☆381Updated 4 months ago
- A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆341Updated 2 years ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆305Updated 2 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆204Updated 4 months ago
- A python script to scan for Apache Tomcat server vulnerabilities.☆793Updated last month
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆226Updated last month
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆314Updated 4 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆417Updated this week
- MultiPlatform HTTP Reverse Shell☆230Updated last month
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆103Updated last month
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆387Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,051Updated 3 weeks ago