CVE-2009-2698 compiled for CentOS 4.8
☆28Feb 16, 2018Updated 8 years ago
Alternatives and similar repositories for CVE-2009-2698
Users that are interested in CVE-2009-2698 are comparing it to the libraries listed below
Sorting:
- ☆16Oct 26, 2021Updated 4 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- Tools/scripts I used/developed during the EXP-301 course.☆26May 17, 2022Updated 3 years ago
- Scripts created to help with post exploitation of a Windows host☆99Feb 1, 2021Updated 5 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆64Jun 30, 2022Updated 3 years ago
- bitcoin arbitrage between Huobi and Okcoin☆22Dec 31, 2016Updated 9 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Changes for Visual Studio 2013☆119Jun 22, 2015Updated 10 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆38Jul 12, 2023Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆41Jul 9, 2023Updated 2 years ago
- AI Bill of Materials through source code scanning☆33Feb 25, 2026Updated last week
- Script for pentest☆39Oct 14, 2020Updated 5 years ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Aug 7, 2023Updated 2 years ago
- ☆43Jan 2, 2023Updated 3 years ago
- MS17-010_CVE-2017-0143☆38Jun 5, 2025Updated 9 months ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Library to parse Splunk-specific .conf files.☆12Mar 2, 2026Updated last week
- Compliance-to-Policy (C2P) provides the framework to bridge the gap between compliance and policy administration in Go.☆25Updated this week
- ☆14Jan 7, 2026Updated 2 months ago
- Semgrep Pro Rules to ensure code using LLMs is following best practices☆45Updated this week
- Personal Security Blog☆13Nov 4, 2024Updated last year
- 基于Linux c开发的插件式扫描器(Python/lua)☆35Feb 27, 2016Updated 10 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Terraform modules for cloud.gov managed services☆14Mar 2, 2026Updated last week
- Public sync with private repo azure-aks-docs-pr☆11Updated this week
- ☆13Jul 24, 2023Updated 2 years ago
- ☆11Nov 13, 2020Updated 5 years ago
- FedRAMP Documentation☆46Updated this week
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- 介绍:这个是用来分享大家学习中使用的资料的,一个人学习,不如大家一起学习 基于adobe提供的一个文件帐号,来达到共享学习资料的模式,建议都传pdf的文档上来 国内登录,有些慢,需要一点耐心,但是能实现各个终端同步阅读pdf,同时又不用泄漏其他比较隐私的账号 网址:h…☆12Sep 18, 2014Updated 11 years ago
- Read a .TLScan file containing the PCIe Configuration Space and Generate a Write Mask☆11Sep 10, 2024Updated last year
- ☆11Oct 2, 2025Updated 5 months ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- A lightweight packet capture application☆12Oct 16, 2014Updated 11 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Security Lab☆13Jun 5, 2023Updated 2 years ago