Real profit
2.88K subscribers
107 photos
4 videos
155 files
3.37K links
Just invest your time
Download Telegram
Metasploit modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49/2.4.50)
https://github.com/Zeop-CyberSec/apache_normalize_path/commits/master

Apachuk - CVE-2021-41773 Grabber with Shodan
https://github.com/apapedulimu/Apachuk
Remote Code Execution V1 For iOS 15 sent through airdrop after the device was connected to a trusted host

https://github.com/jonathandata1/ios_15_rce

Bindiff and POC for the IOMFB vulnerability, iOS 15.0.2

https://saaramar.github.io/IOMFB_integer_overflow_poc/
Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker

https://github.com/im-hanzou/apachrot
CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)

https://github.com/rjt-gupta/CVE-2021-29337
Scan installed EDRs and AVs on Windows https://github.com/FourCoreLabs/EDRHunt

#kill_edr
A tool to kill antimalware protected processes https://github.com/Yaxser/Backstab
The Ultimate #OSINT and Threat Hunting Framework
Blockchain Search
Domain Fuzzer
Twitter Scraper
Instagram Search
Have I Been Pwned Search
Ahmia Darkweb Search
IP Stack Search
Threat Crowd Search
Yandex and Naver Search
Vkontakte Search
Vulners Search and more .. .

https://github.com/matamorphosis/Scrummage
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server #poc exploit
https://github.com/bhdresh/CVE-2021-33766

#poc CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
https://github.com/ZeusBox/CVE-2021-37980

My take on CVE-2021-30858 #poc for ps4 8.xx It's just a POC
https://github.com/PeterMxx/ps4_8.00_vuln_poc

A simple Python proof of concept for CVE-2021-38295
https://github.com/ProfessionallyEvil/CVE-2021-38295-PoC

apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)
https://github.com/theLSA/apache-httpd-path-traversal-checker
#stateafl a coverage driven greybox fuzzer for stateful network protocols

https://github.com/stateafl/stateafl
#Finger is a function symbol recognition engine for binary programs developed by Alibaba Cloud · Cloud Security Technology Lab, which aims to help security researchers identify unknown library functions in a given binary file

https://github.com/aliyunav/Finger
#sleep_python_bridge It allows the control of a Cobalt Strike teamserver through python without the need for for the standard GUI client.

https://github.com/Cobalt-Strike/sleep_python_bridge
#ddosify High-performance load testing tool, written in Go

https://github.com/ddosify/ddosify
#poc (DoS) for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)

https://github.com/ollypwn/CallbackHell
#Python Ethical Hacking, published by Packt
https://github.com/PacktPublishing/Python-Ethical-Hacking

 A pure #Python Network Packet Sniffing tool
 https://github.com/EONRaider/Packet-Sniffer

#Python Script to access ATT&CK content available in STIX via a public TAXII server
https://github.com/OTRF/ATTACK-Python-Client

#Python Scripts for Hacking
https://github.com/Adastra-thw/pyHacks

Source code for the book Black Hat #Python 
https://github.com/EONRaider/blackhat-python3