Pinned Repositories
bluekeep-exploit
Bluekeep(CVE 2019-0708) exploit released
CVE2020-17087
Elevation Of Privileges Proof of Concept for Windows (win7-win10)
GPT4Docs
An Offline Document Enquiry LLM for Everyone
IbaConv
A wrapper for ibaAnalyzer to automatically do file conversion to different formats
ios-RCE-Vulnerability
Latest ios RCE Vulnerability disclosed by Google Security Researcher
PinsTer
A Pinging Software to do very fast parallel pinging in bulk and visualize in Web-Browser. It can also be used in SCADA/HMI for updating tags or representation in web-browser directly using Web-Browser component
reset-excel-password
Reset Excel sheet and workbook protection
whatsapp_rce
whatsapp remote code execution
WIN10-Activation
Windows-EOP-Exploit
Latest working elevation of privilege exploit by Tavis Ormandy from Google's Project Zero Team
TinToSer's Repositories
TinToSer/whatsapp_rce
whatsapp remote code execution
TinToSer/WIN10-Activation
TinToSer/CVE2020-17087
Elevation Of Privileges Proof of Concept for Windows (win7-win10)
TinToSer/Ios-Jailbreak
jailbreak-ios-exploit
TinToSer/GPT4Docs
An Offline Document Enquiry LLM for Everyone
TinToSer/IbaConv
A wrapper for ibaAnalyzer to automatically do file conversion to different formats
TinToSer/PinsTer
A Pinging Software to do very fast parallel pinging in bulk and visualize in Web-Browser. It can also be used in SCADA/HMI for updating tags or representation in web-browser directly using Web-Browser component
TinToSer/winbyepass
A very simple Non destructive solution to reset Windows Password
TinToSer/Corel-draw-crack
How to crack corel draw
TinToSer/CVE-2020-0796-LPE
SMBGHOST local privilege escalation
TinToSer/cve2020-0796
Microsoft SMV3.1.1 wormable Exploit
TinToSer/port-forwarder
A handly portable GUI for windows port forwarding
TinToSer/RigClConxM
A handy tool to extend ibaAnalyzer feature on right click in right click context menu
TinToSer/CoVacK
A software to reveal the truth of Vaccine availability in your location by OTP
TinToSer/CVE-2019-11932-SupportApp
This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability.
TinToSer/duckdns
A Program which runs in your PC and gives you fixed domain from dynamic IP
TinToSer/llm-duckduckgo
A simple pythonic way for unlimited access to LLM provided by duck.ai
TinToSer/MouPaThack
A mouse position tracking program
TinToSer/port-routing
A Python program to route the network traffic from one port to another
TinToSer/pscad-blackbox
A simple Python script to Black Box PSCAD project by intelligent removal of components required for black boxing
TinToSer/pythonPortableRunner
A standalone Python Executable to Run your Python scripts so that You can distribute Python code directly
TinToSer/Windows-Product-Key-Script
View your windows product key
TinToSer/Enable-RDP-bat
To enable RDP, disable NLA and allow even blank passwords
TinToSer/gitexcel
Compare Excel files with Git versioning using Microsoft SPREADSHEETCOMPARE tool
TinToSer/pscad-version-handler
Gives option to set which PSCAD version to open by default and which on demand, just right click and you will see the second option as "Open PSCAD" and then select the version to open with
TinToSer/pscadLicenseTricks
A repo where we share things which help PSCAD Admins or Users
TinToSer/SCD-Miner
A Software solution to Extract all Useful information from SCD files for IEDs
TinToSer/VirtualMonitors
Fake Desktop Monitor solution to have multiple screens on Remote desktop session of any windows computer
TinToSer/webHoster
A minimalistic web hosting standalone executable
TinToSer/wincc-auto
A Command Line tool to automate SIEMENS Wincc by injecting Tag values or fetching Tag values