merlot41's starred repositories
supervision
We write your reusable computer vision tools. 💜
SimpleTrendReversalEA
MT4 EA for the simple trend reversal strategy
FreeExpertAdvisor
FreeExpertAdvisor is a free and open source Forex expert advisor for the Metatrader 4 platform
CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
Microsoft-Outlook-Remote-Code-Execution-Vulnerability
telegram-get-remote-ip
Get IP address on other side audio call in Telegram.
CVE-2023-35086-POC
POC of CVE-2023-35086 only DoS
CVE-2022-47966
POC for CVE-2022-47966 affecting multiple ManageEngine products
EnableWindowsLogSettings
Documentation and scripts to properly enable Windows event logs.
msdorkdump
Google Dork File Finder
CVE-2022-2588
exploit for CVE-2022-2588
CVE-2021-4154
CVE-2021-4154 exploit
ThreatIntelligenceDiscordBot
Gets updates from various clearnet domains and ransomware threat actor domains
TripleCross
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
MobileHackingCheatSheet
Basics on commands/tools/info on how to assess the security of mobile applications
mitmproxy2swagger
Automagically reverse-engineer REST APIs via capturing traffic
JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
SharPyShell
SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications
CVE-2022-26923_AD-Certificate-Services
The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.
CVE-2022-1388-POC
An Improved Proof of Concept for CVE-2022-1388 w/ an Interactive Shell