xfox64x / CVE-2018-11776View external linksLinks
Creating a vulnerable environment and the PoC
☆15Nov 25, 2019Updated 6 years ago
Alternatives and similar repositories for CVE-2018-11776
Users that are interested in CVE-2018-11776 are comparing it to the libraries listed below
Sorting:
- ☆19Jun 26, 2017Updated 8 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- glibc getcwd() local privilege escalation compiled binaries☆32Feb 9, 2018Updated 8 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Aug 25, 2018Updated 7 years ago
- Powershell攻击指南----黑客后渗透之道☆29Dec 13, 2017Updated 8 years ago
- Cloud security projects with Spring Cloud Config Server and Vault☆29Dec 15, 2025Updated 2 months ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Oct 1, 2017Updated 8 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- Tool for introspection of SSL\TLS sessions☆142Jan 26, 2026Updated 2 weeks ago
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Apr 16, 2018Updated 7 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- ☆13Mar 28, 2024Updated last year
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- Tool is to check for Cache Deception Attack Both For Authenticated and UnAuthenticated Pages☆44Nov 23, 2021Updated 4 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- Resolve Skype accounts by phone number with API interface☆13Jul 16, 2023Updated 2 years ago
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 4, 2026Updated last week
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago