| bitsadmin/wesng |
3,789 |
|
0 |
0 |
over 2 years ago |
3 |
November 10, 2021 |
11 |
bsd-3-clause |
Python |
| Windows Exploit Suggester - Next Generation |
| nixawk/labs |
939 |
|
0 |
0 |
over 7 years ago |
0 |
|
10 |
|
Python |
| Vulnerability Labs for security analysis |
| giMini/PowerMemory |
726 |
|
0 |
0 |
about 6 years ago |
0 |
|
4 |
other |
PowerShell |
| Exploit the credentials present in files and memory |
| insecurityofthings/jackit |
554 |
|
0 |
0 |
over 5 years ago |
0 |
|
26 |
|
Python |
| JackIt - Exploit Code for Mousejack |
| shogunlab/awesome-hyper-v-exploitation |
240 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
gpl-3.0 |
|
| A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research. |
| danigargu/explodingcan |
219 |
|
0 |
0 |
over 8 years ago |
0 |
|
3 |
|
Python |
| An implementation of NSA's ExplodingCan exploit in Python |
| advanced-threat-research/CVE-2020-16898 |
197 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
Lua |
| CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule |
| kljunowsky/CVE-2022-41040-POC |
73 |
|
0 |
0 |
about 3 years ago |
0 |
|
1 |
|
Python |
| CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server |
| billythegoat356/Rage |
72 |
|
0 |
0 |
over 2 years ago |
0 |
|
5 |
epl-2.0 |
Python |
| Rage allows you to execute any file in a Microsoft Office document. |
| d4t4s3c/SMBploit |
63 |
|
0 |
0 |
about 4 years ago |
0 |
|
1 |
gpl-3.0 |
Shell |
| Offensive tool to scan & exploit vulnerabilities in Microsoft Windows over the Samba protocol (SMB) using the Metasploit Framework. |