Creating a vulnerable environment and the PoC
☆15Nov 25, 2019Updated 6 years ago
Alternatives and similar repositories for CVE-2018-11776
Users that are interested in CVE-2018-11776 are comparing it to the libraries listed below
Sorting:
- ☆19Jun 26, 2017Updated 8 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- glibc getcwd() local privilege escalation compiled binaries☆32Feb 9, 2018Updated 8 years ago
- Powershell攻击指南----黑客后 渗透之道☆29Dec 13, 2017Updated 8 years ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- Cloud security projects with Spring Cloud Config Server and Vault☆29Feb 22, 2026Updated 2 weeks ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- Tool for introspection of SSL\TLS sessions☆146Updated this week
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- A rust crate for parsing, writing and manipulating Android smali files.☆17Jan 14, 2026Updated last month
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Some setup scripts for security research tools.