Vulnerability checker for Callstranger (CVE-2020-12695)
☆403Aug 7, 2021Updated 4 years ago
Alternatives and similar repositories for CallStranger
Users that are interested in CallStranger are comparing it to the libraries listed below
Sorting:
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- Malware, spam, and phishing indicators of compromise that involve the use of COVID-19 or coronavirus in some way☆34Jul 4, 2020Updated 5 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- ☆1,380Jul 2, 2020Updated 5 years ago
- ☆26Sep 2, 2025Updated 6 months ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆799Apr 22, 2022Updated 3 years ago
- repository dedicated to the development of Globe 42 collective application to help them to manage their members☆12Sep 2, 2022Updated 3 years ago
- A backup application for the Android Open Source Project.☆21Feb 24, 2026Updated 2 weeks ago
- python tree algorithms for nearest neighbor search☆13Aug 25, 2011Updated 14 years ago
- CVE-2020-1206 Uninitialized Kernel Memory Read POC☆147Jun 9, 2020Updated 5 years ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,534Sep 16, 2024Updated last year
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Dec 11, 2019Updated 6 years ago
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆439Nov 27, 2023Updated 2 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- 用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞☆52May 21, 2020Updated 5 years ago
- A Python 3 implementation of Tree data structure☆16Oct 31, 2014Updated 11 years ago
- Evil domains for our Collective Hosts File Project that are not present in any other lists.☆14Mar 10, 2021Updated 5 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,549Feb 19, 2026Updated 2 weeks ago
- Public work for CVE-2019-0708☆291Nov 19, 2019Updated 6 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,348Dec 7, 2020Updated 5 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆679Oct 28, 2023Updated 2 years ago
- List of sensitive fields that should be masked, obfuscated, or purged for security purposes☆22Sep 11, 2023Updated 2 years ago
- TOoltip-poweRed Phishing Email DetectiOn☆16Jun 4, 2024Updated last year
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,645Aug 28, 2025Updated 6 months ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆20Mar 16, 2022Updated 3 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- ☆24Oct 31, 2023Updated 2 years ago
- CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻☆224Aug 25, 2021Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- Running Hashcat on Google Colab with session backup and restore.☆743Jan 14, 2022Updated 4 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆330Feb 26, 2023Updated 3 years ago
- Domain blocklist covering manually spotted trackers, marketing bullshit, abusive domains, telemetry and other nuisances.☆12Sep 20, 2021Updated 4 years ago
- Test tool for CVE-2020-1472☆1,806Jun 27, 2025Updated 8 months ago
- Exploit for CVE-2020-3952 in vCenter 6.7☆277Apr 16, 2020Updated 5 years ago
- The place to talk about our infrastructure or everything related to the Ultimate Hosts Blacklist project.☆12Oct 2, 2024Updated last year
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- Interactive CTF Exploration Tool☆1,664Sep 17, 2021Updated 4 years ago