Vulnerability checker for Callstranger (CVE-2020-12695)
☆403Aug 7, 2021Updated 4 years ago
Alternatives and similar repositories for CallStranger
Users that are interested in CallStranger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- Malware, spam, and phishing indicators of compromise that involve the use of COVID-19 or coronavirus in some way☆35Jul 4, 2020Updated 5 years ago
- ☆1,386Jul 2, 2020Updated 5 years ago
- ☆26Sep 2, 2025Updated 7 months ago
- List of sensitive fields that should be masked, obfuscated, or purged for security purposes☆22Sep 11, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- 用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞☆52May 21, 2020Updated 5 years ago
- Evil domains for our Collective Hosts File Project that are not present in any other lists.☆14Mar 10, 2021Updated 5 years ago
- repository dedicated to the development of Globe 42 collective application to help them to manage their members☆12Sep 2, 2022Updated 3 years ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,549Sep 16, 2024Updated last year
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Apr 22, 2022Updated 3 years ago
- python tree algorithms for nearest neighbor search☆13Aug 25, 2011Updated 14 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- A backup application for the Android Open Source Project.☆21Feb 24, 2026Updated last month
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PoC designed to evade userland-hooking anti-virus.☆90May 15, 2019Updated 6 years ago
- IoT固件漏洞复现环境☆1,271Jul 30, 2023Updated 2 years ago
- Domain blocklist covering manually spotted trackers, marketing bullshit, abusive domains, telemetry and other nuisances.☆12Sep 20, 2021Updated 4 years ago
- ☆10Nov 13, 2022Updated 3 years ago
- Admin Dashboard for PiRouter☆43Feb 9, 2018Updated 8 years ago
- This repo contains alls the vulnerabilities identified as a part of security research against IoT devices☆23Jul 24, 2021Updated 4 years ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆21Mar 16, 2022Updated 4 years ago
- A Python 3 implementation of Tree data structure☆16Oct 31, 2014Updated 11 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆65Jan 19, 2022Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻☆225Aug 25, 2021Updated 4 years ago
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆441Nov 27, 2023Updated 2 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆112Dec 11, 2019Updated 6 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆155May 17, 2020Updated 5 years ago
- A DNS Sinkhole List for testing purposes. (not for use in production systems) - UUID: 0f90ca2c-4b0a-4fbe-b659-449ab30c4284☆19Apr 4, 2021Updated 5 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,561Updated this week
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- TOoltip-poweRed Phishing Email DetectiOn☆16Jun 4, 2024Updated last year
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,351Dec 7, 2020Updated 5 years ago
- Test of https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt☆10Apr 5, 2026Updated last week
- ☆24Oct 31, 2023Updated 2 years ago
- ☆20Jan 25, 2022Updated 4 years ago
- Support ALL Windows Version☆722Sep 11, 2020Updated 5 years ago