Pinned Repositories
3proxy
3proxy - tiny free proxy server
ADCSKiller
An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer
Android-Malwares
articles
AsyncRAT-C-Sharp
Open-Source Remote Administration Tool For Windows C# (RAT)
AtomDucky
WiFi Rubber Ducky with a web interface using CircuitPython
auth_bypass_connectwise_screenconnect
Exploit ConnectWise ScreenConnect (bypass authentication)
Auto_Tor_IP_changer
change your Ip address automatically This tool based on tor project
bits-tampering
The POC script allows you to add a file to download to a BITS task that was created by another process
CVE-2023-27532
POC for Veeam Backup and Replication CVE-2023-27532
Dmitri131313's Repositories
Dmitri131313/azure-oai-proxy
A self-hosted proxy for Azure OpenAI that converts a Azure OpenAI API request into an OpenAI API request to enable use of projects/services that are only compatible with OpenAI specifc endpoints.
Dmitri131313/badsecrets
A library for detecting known secrets across many web frameworks
Dmitri131313/botan
Cryptography Toolkit
Dmitri131313/chainsaw
Rapidly Search and Hunt through Windows Forensic Artefacts
Dmitri131313/CVE-2024-49112
LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49112
Dmitri131313/CVE-2024-50379
CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs).
Dmitri131313/CVE-2024-50379-1-
tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp
Dmitri131313/CVE-2024-50623
Cleo Unrestricted file upload and download PoC (CVE-2024-50623)
Dmitri131313/CVE-2024-53677-S2-067
A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.
Dmitri131313/cvelistV5
CVE cache of the official CVE List in CVE JSON 5 format
Dmitri131313/Dom-Explorer
Dmitri131313/fortios-auth-bypass-check-CVE-2024-55591
Dmitri131313/gsocket
Connect like there is no firewall. Securely.
Dmitri131313/hapi-fhir
🔥 HAPI FHIR - Java API for HL7 FHIR Clients and Servers
Dmitri131313/i2pd
🛡 I2P: End-to-End encrypted and anonymous Internet
Dmitri131313/janus-gateway
Janus WebRTC Server
Dmitri131313/katana
A next-generation crawling and spidering framework.
Dmitri131313/Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Dmitri131313/nuclei-templates
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Dmitri131313/PowerToys
Windows system utilities to maximize productivity
Dmitri131313/Sara
RouterOS Security Inspector
Dmitri131313/sqlmap
Automatic SQL injection and database takeover tool
Dmitri131313/trufflehog
Find, verify, and analyze leaked credentials
Dmitri131313/winget-cli
WinGet is the Windows Package Manager. This project includes a CLI (Command Line Interface), PowerShell modules, and a COM (Component Object Model) API (Application Programming Interface).
Dmitri131313/echidna
Ethereum smart contract fuzzer
Dmitri131313/hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Dmitri131313/pipx
Install and Run Python Applications in Isolated Environments
Dmitri131313/prometheus
The Prometheus monitoring system and time series database.
Dmitri131313/web-php
The www.php.net site
Dmitri131313/ysoserial.net
Deserialization payload generator for a variety of .NET formatters