Git Product home page Git Product logo

elon-msk's Projects

akamai-toolkit icon akamai-toolkit

A set of tools to work on Akamai v1 anti-bot solution. Current supported version: 1.70

aws-ip-ranges-json icon aws-ip-ranges-json

AWS IP Ranges History Tracker Amazon - AWS provides a list of IP Addresses used by their various services through a published ip-ranges.json file. This Git repository tracks this file so that changes are easy to identify.

chrome-sbx-db icon chrome-sbx-db

A Collection of Chrome Sandbox Escape POCs/Exploits for learning

cve-2017-0199 icon cve-2017-0199

Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.

cve-2017-8759 icon cve-2017-8759

Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.

cve-2022-27925 icon cve-2022-27925

Zimbra Unauthenticated Remote Code Execution Exploit (CVE-2022-27925)

cve-2023-21608 icon cve-2023-21608

Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit

cve-2023-28231 icon cve-2023-28231

DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019

evilclippy icon evilclippy

A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.

evilginx2 icon evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

fortigate icon fortigate

Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)

geolite2 icon geolite2

MaxMind's GeoLite2 Country, City, and ASN databases in csv and mmdb.

gpt4free icon gpt4free

decentralising the Ai Industry, free gpt-4/3.5 scripts through several reverse engineered api's ( poe.com, phind.com, chat.openai.com, phind.com, writesonic.com, sqlchat.ai, t3nsor.com, you.com etc...)

inceptor icon inceptor

Template-Driven AV/EDR Evasion Framework

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.