1.Create a Sample Vulnerable Application .
2.Start a netcat listner .
3.Run the exploit .
5.Use jdk1.8.0_20 for better results .
Exploit-db - https://www.exploit-db.com/exploits/50592
1.Create a Sample Vulnerable Application .
2.Start a netcat listner .
3.Run the exploit .
5.Use jdk1.8.0_20 for better results .
Exploit-db - https://www.exploit-db.com/exploits/50592
Spring Cloud Gateway 3.0.7 & 3.1.1 Code Injection (RCE) CVE: CVE-2022-22947 CVSS: 10.0 (Vmware - https://tanzu.vmware.com/security/cve-2022-22947)
This is an injection tool that can inject any xposed modules apk into the debug android app, the native code in the xposed module can also be injected.
Site Scanner Tools For Scanning Any Site and Get Site Information Example Require - pip install colorama - pip install requests How To Use Download Th
sshmap SSH Tool For OSINT and then Cracking. Linux Systems Only Usage: Scanner Syntax: scanner start/stop/status - Sarts/stops/sho
xkeysnail is yet another keyboard remapping tool for X environment written in Python. It's like xmodmap but allows more flexible remappings.
-Python-DNS-Lookup- β¨ π Python DNS Lookup β¨ π The Domain Name System (DNS) is
whois_bot #whois it? Let's find out! Currently in development: a gatekeeper bot for a community (https://t.me/IT_antalya) of 250+ expat IT pros of Ant
AutoTor Auto Tor Ip Changer for Linux! git clone https://github.com/Arest7/AutoTor cd AutoTor pip install -r requirements.txt python3 AutoTor.py follo
The project This project is a simple linux keylogger. When activated, it registers all the actions made with the keyboard. The log files are registere
Pass2Pwn is a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on the organization's name
Zip-Cracker Video Lesson : This is a Very powerfull Zip File Crack tool for termux users. Check 500 000 Passwords in 30 seconds Unique Performance Che
μμΌμ μ΄μ©ν RDT protocols (RDT3.0,GBN,SR) ꡬν λ° μ±λ₯ νκ° μ½λ μ λλ€. μ½λλ₯Ό μ€νν λ 리μλ²λ₯Ό λ¨Όμ μ€ννμΈμ. μ±λ₯ νκ° μ½λλ ν¨ν· μ μ‘ κ³Όμ μ μ μΈνκ³ μκ°λΉ μ μ‘λ₯ μ μΆλ ₯ν©λλ€. RDT3.0 GBN SR(λ²κ·Έ λ°κ²¬μΌλ‘ ꡬνμ€ μ λ
CVE-2021-3560 Polkit - Local Privilege Escalation Original discovery by kevin_backhouse from GitHub Security Lab References https://github.blog/2021-0
Free HTTP Proxy List π It is a lightweight project that hourly scrapes lots of
Python-Keylogger This is a keylogger in python for Windows, Mac and Linux! #How to use it by downloading the zip file? Download the zip file first The
BitwardenDecryptBrute This is a slightly modified version of BitwardenDecrypt. In addition to the decryption this version can do wordlist attacks for
π£ Bomb Crypto Bot π£ β οΈ Warning I am not responsible for any penalties incurred by those who use the bot, use it at your own risk. π Documentation -
Instagram-Brute-Force The purpose of this script is to brute-force guess the passwords to Instagram accounts. Specifics: Comes with 2 separate modes i
Malware Configuration Extractor A Malware Configuration Extraction Tool and Modules for MalDuck This project is FREE as in FREE πΊ , use it commercial
CVE-2022-22965 Spring Framework/CVE-2022-22965 Vulnerability ID: CVE-2022-22965/CNVD-2022-23942/QVD-2022-1691 Reproduce the vulnerability docker pull