Metasploit modules (scanner and exploit) for the CVE-2021-41773 and CVE-2021-42013 (Path Traversal in Apache 2.4.49/2.4.50)
https://github.com/Zeop-CyberSec/apache_normalize_path/commits/master
Apachuk - CVE-2021-41773 Grabber with Shodan
https://github.com/apapedulimu/Apachuk
https://github.com/Zeop-CyberSec/apache_normalize_path/commits/master
Apachuk - CVE-2021-41773 Grabber with Shodan
https://github.com/apapedulimu/Apachuk
Remote Code Execution V1 For iOS 15 sent through airdrop after the device was connected to a trusted host
https://github.com/jonathandata1/ios_15_rce
Bindiff and POC for the IOMFB vulnerability, iOS 15.0.2
https://saaramar.github.io/IOMFB_integer_overflow_poc/
https://github.com/jonathandata1/ios_15_rce
Bindiff and POC for the IOMFB vulnerability, iOS 15.0.2
https://saaramar.github.io/IOMFB_integer_overflow_poc/
Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
https://github.com/im-hanzou/apachrot
https://github.com/im-hanzou/apachrot
CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)
https://github.com/rjt-gupta/CVE-2021-29337
https://github.com/rjt-gupta/CVE-2021-29337
Scan installed EDRs and AVs on Windows https://github.com/FourCoreLabs/EDRHunt
#kill_edr
A tool to kill antimalware protected processes https://github.com/Yaxser/Backstab
#kill_edr
A tool to kill antimalware protected processes https://github.com/Yaxser/Backstab
The Ultimate #OSINT and Threat Hunting Framework
Blockchain Search
Domain Fuzzer
Twitter Scraper
Instagram Search
Have I Been Pwned Search
Ahmia Darkweb Search
IP Stack Search
Threat Crowd Search
Yandex and Naver Search
Vkontakte Search
Vulners Search and more .. .
https://github.com/matamorphosis/Scrummage
Blockchain Search
Domain Fuzzer
Twitter Scraper
Instagram Search
Have I Been Pwned Search
Ahmia Darkweb Search
IP Stack Search
Threat Crowd Search
Yandex and Naver Search
Vkontakte Search
Vulners Search and more .. .
https://github.com/matamorphosis/Scrummage
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server #poc exploit
https://github.com/bhdresh/CVE-2021-33766
#poc CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
https://github.com/ZeusBox/CVE-2021-37980
My take on CVE-2021-30858 #poc for ps4 8.xx It's just a POC
https://github.com/PeterMxx/ps4_8.00_vuln_poc
A simple Python proof of concept for CVE-2021-38295
https://github.com/ProfessionallyEvil/CVE-2021-38295-PoC
apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)
https://github.com/theLSA/apache-httpd-path-traversal-checker
https://github.com/bhdresh/CVE-2021-33766
#poc CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)
https://github.com/ZeusBox/CVE-2021-37980
My take on CVE-2021-30858 #poc for ps4 8.xx It's just a POC
https://github.com/PeterMxx/ps4_8.00_vuln_poc
A simple Python proof of concept for CVE-2021-38295
https://github.com/ProfessionallyEvil/CVE-2021-38295-PoC
apache httpd path traversal checker(CVE-2021-41773 / CVE-2021-42013)
https://github.com/theLSA/apache-httpd-path-traversal-checker
#stateafl a coverage driven greybox fuzzer for stateful network protocols
https://github.com/stateafl/stateafl
https://github.com/stateafl/stateafl
#Finger is a function symbol recognition engine for binary programs developed by Alibaba Cloud · Cloud Security Technology Lab, which aims to help security researchers identify unknown library functions in a given binary file
https://github.com/aliyunav/Finger
https://github.com/aliyunav/Finger
#sleep_python_bridge It allows the control of a Cobalt Strike teamserver through python without the need for for the standard GUI client.
https://github.com/Cobalt-Strike/sleep_python_bridge
https://github.com/Cobalt-Strike/sleep_python_bridge
#poc (DoS) for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)
https://github.com/ollypwn/CallbackHell
https://github.com/ollypwn/CallbackHell
#Python Ethical Hacking, published by Packt
https://github.com/PacktPublishing/Python-Ethical-Hacking
A pure #Python Network Packet Sniffing tool
https://github.com/EONRaider/Packet-Sniffer
#Python Script to access ATT&CK content available in STIX via a public TAXII server
https://github.com/OTRF/ATTACK-Python-Client
#Python Scripts for Hacking
https://github.com/Adastra-thw/pyHacks
Source code for the book Black Hat #Python
https://github.com/EONRaider/blackhat-python3
https://github.com/PacktPublishing/Python-Ethical-Hacking
A pure #Python Network Packet Sniffing tool
https://github.com/EONRaider/Packet-Sniffer
#Python Script to access ATT&CK content available in STIX via a public TAXII server
https://github.com/OTRF/ATTACK-Python-Client
#Python Scripts for Hacking
https://github.com/Adastra-thw/pyHacks
Source code for the book Black Hat #Python
https://github.com/EONRaider/blackhat-python3