Pinned Repositories
afdWordpress
Check arbitrary file download vulnerability in the WordPress
Fuzzil
The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.
Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed
This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.
OSINT-Enum-de-infraestrutura-Aeroportos-Aerodrome
OSINT: Enumeração de infraestrutura / Aeroportos / Aeródromo.
Python_PyQt5_DashReceitaFederal
This is the study of an interface with PyQt5 / Python - Receita Federal - Modern Gui [Qt Designer, PyQt5].
SCANNER-INURLBR
Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
ShellShockHunter
It's a simple tool for test vulnerability shellshock
SimpleReconSubdomain
This is very basic automated recon script tool.
SimplesApachePathTraversal
Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519
osint-brazuca
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
MrCl0wnLab's Repositories
MrCl0wnLab/SCANNER-INURLBR
Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
MrCl0wnLab/ShellShockHunter
It's a simple tool for test vulnerability shellshock
MrCl0wnLab/SimplesApachePathTraversal
Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519
MrCl0wnLab/Python_PyQt5_DashReceitaFederal
This is the study of an interface with PyQt5 / Python - Receita Federal - Modern Gui [Qt Designer, PyQt5].
MrCl0wnLab/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed
This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.
MrCl0wnLab/Python_PySide2_DashInfosecGreen
This is the study of an interface with PySide2 / Python - DashBoard - Modern Gui [Qt Designer, PySide2]
MrCl0wnLab/SimpleReconSubdomain
This is very basic automated recon script tool.
MrCl0wnLab/checker-cve2020-3452
Cisco Adaptive Security Appliance and FTD Unauthorized Remote File Reading
MrCl0wnLab/ProxyGoogleTranslate
Using Google translate as WebProxy
MrCl0wnLab/Python_PyQT_ProgressBarPurple
This is the study of an interface with PyQT
MrCl0wnLab/Python_PySide2_LoginBarberShop
This is the study of an interface with PySide2 / Python - Login - Modern Gui [Qt Designer, PySide2/PyQt5]
MrCl0wnLab/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter
CVE-2022-1388 is an authentication bypass vulnerability in the REST component of BIG-IP’s iControl API that was assigned a CVSSv3 score of 9.8. The iControl REST API is used for the management and configuration of BIG-IP devices. CVE-2022-1388 could be exploited by an unauthenticated attacker with network access to the management port or self IP addresses of devices that use BIG-IP. Exploitation would allow the attacker to execute arbitrary system commands, create and delete files and disable services.
MrCl0wnLab/MetaOSINT.github.io
A tool to quickly identify relevant, publicly-available open source intelligence ("OSINT") tools and resources, saving valuable time during investigations, research, and analysis.
MrCl0wnLab/checker-CVE-2020-5902
Checker CVE-2020-5902: BIG-IP versions 15.0.0 through 15.1.0.3, 14.1.0 through 14.1.2.5, 13.1.0 through 13.1.3.3, 12.1.0 through 12.1.5.1, and 11.6.1 through 11.6.5.1 suffer from Traffic Management User Interface (TMUI) arbitrary file read and command execution vulnerabilities.
MrCl0wnLab/OSINT-Enum-de-infraestrutura-Aeroportos-Aerodrome
OSINT: Enumeração de infraestrutura / Aeroportos / Aeródromo.
MrCl0wnLab/MrCl0wnLab
profile
MrCl0wnLab/Drawflow
Simple flow library 🖥️🖱️
MrCl0wnLab/GambaShell
GambaShell program made to facilitate the processes in the linux terminal
MrCl0wnLab/nuclei-templates
Community curated list of templates for the nuclei engine to find security vulnerabilities.
MrCl0wnLab/OSINT-Grupo-Telegram-MOVIMENTO-ANTI-NOVO-NORMAL
O negacionismo é o ato de negar-se a acreditar em uma informação estabelecida em áreas como a ciência e a história. Os negacionistas são vistos como irracionais, pois não acreditam em consensos obtidos por amplo e profundo estudo e escoram suas crenças em informações falsas e teorias conspiratórias. A negação do Holocausto é uma das principais manifestações negacionistas.
MrCl0wnLab/Python_QT_CustomTheme
Projeto visando auxiliar programadores Python na personalização de Forms feitos com biblioteca QT. Esse projeto demonstra diversos temas e o uso de arquivos .qss.
MrCl0wnLab/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
MrCl0wnLab/OSINT-Grupo-Telegram-A-IGREJA-QUE-SER-ARREBATADA
OSINT: Grupo religioso negacionista "A Igreja que será arrebatada". É responsável pelo envio de cerca de 100 mil cartas vinculando vacina com Lucifer, QrCode, Bill Gates e outras doideiras.
MrCl0wnLab/pywebview
Build GUI for your Python program with JavaScript, HTML, and CSS
MrCl0wnLab/MAP-OSINT-Enum-de-infraestrutura-Aeroportos-Aerodrome
MrCl0wnLab/mrcl0wnlab.github.io
MrCl0wnLab/osint-brazuca
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
MrCl0wnLab/readme-template
README.md template for your open-source project
MrCl0wnLab/Arg-Graph
a simple JQuery library to create or edit directed graphs.
MrCl0wnLab/grepado
Projeto simples para grepar valores usando uma lista como base