Nicolas Krassas's repositories

hikvision

Hikvision log4j PoC

CVE-2024-20931

CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839

synackDUO

Python Duo Push API

Language:PythonStargazers:22Issues:0Issues:0

citrix_cve-2023-4966

Citrix CVE-2023-4966 from assetnote modified for parallel and file handling

Language:PythonStargazers:10Issues:2Issues:0

weblogic

Weblogic exploits

Language:PythonStargazers:1Issues:2Issues:0

ysoserial.net-docker

ysoserial.net docker image

Language:ShellStargazers:1Issues:1Issues:0

avred

Analyse your malware to surgically obfuscate it

Language:PythonLicense:GPL-3.0Stargazers:0Issues:1Issues:0

awesome-industrial-protocols

Security-oriented list of resources about industrial network protocols.

Language:PythonLicense:CC0-1.0Stargazers:0Issues:0Issues:0

BypassAV

This map lists the essential techniques to bypass anti-virus and EDR

Stargazers:0Issues:0Issues:0

Caro-Kann

Encrypted shellcode Injection to avoid Kernel triggered memory scans

Language:CStargazers:0Issues:0Issues:0
Language:CLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

CVE-2022-33679

One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html

Language:PythonStargazers:0Issues:1Issues:0

CVE-2022-36537

POC of CVE-2022-36537

Language:PythonLicense:GPL-3.0Stargazers:0Issues:1Issues:0

CVE-2022-41040-metasploit-ProxyNotShell

the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.

Language:PythonStargazers:0Issues:1Issues:0
Language:PythonStargazers:0Issues:0Issues:0

DonPAPI

Dumping DPAPI credz remotely

Language:PythonStargazers:0Issues:0Issues:0

ExecIT

Execute shellcode files with rundll32

Language:C++Stargazers:0Issues:0Issues:0

JNDI-Injection-Exploit-Plus

60+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background services by starting RMI server,LDAP server and HTTP server.

Language:JavaLicense:MITStargazers:0Issues:1Issues:0
Language:JavaStargazers:0Issues:0Issues:0

JNDIExploit

对原版https://github.com/feihong-cs/JNDIExploit 进行了实用化修改

Language:JavaStargazers:0Issues:1Issues:0

KubeStalk

KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.

Language:PythonLicense:BSD-3-ClauseStargazers:0Issues:1Issues:0
Language:PythonStargazers:0Issues:1Issues:0

nanodump

The swiss army knife of LSASS dumping

Language:CLicense:Apache-2.0Stargazers:0Issues:0Issues:0
Language:C#Stargazers:0Issues:1Issues:0

redis_get

Get redis keys from open redis, or by using a password. This is to create a proof of concept to be used later in reports.

Language:PythonStargazers:0Issues:1Issues:0

RichFaces

A collection of exploits created or modified by me

Language:PythonStargazers:0Issues:0Issues:0
Language:HTMLStargazers:0Issues:0Issues:0

Weblogic-1

WebLogic vulnerability exploration from beginner to expert.

Stargazers:0Issues:1Issues:0

WeblogicEnvironment

WeblogicEnvironment docker setup for research

Language:ShellStargazers:0Issues:1Issues:0