Skip to content
View charlestsai13's full-sized avatar

Block or report charlestsai13

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. Penetration_Testing_POC Penetration_Testing_POC Public

    Forked from Mr-xn/Penetration_Testing_POC

    渗透测试有关的POC、EXP、脚本、提权、小工具等,欢迎补充、完善---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-po…

    PowerShell 1 1

  2. Mirai-Source-Code Mirai-Source-Code Public

    Forked from jgamblin/Mirai-Source-Code

    Leaked Mirai Source Code for Research/IoC Development Purposes

    C

  3. CVE-2020-1350-DoS CVE-2020-1350-DoS Public

    Forked from maxpl0it/CVE-2020-1350-DoS

    A denial-of-service proof-of-concept for CVE-2020-1350

    Python

  4. CVE-2020-1350 CVE-2020-1350 Public

    Forked from T13nn3s/CVE-2020-1350

    This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service

    PowerShell

  5. CVE-2020-1351 CVE-2020-1351 Public

    Forked from ZephrFish/CVE-2020-1350_HoneyPoC

    Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.

    PowerShell

  6. Fake_CVE-2020-1350 Fake_CVE-2020-1350 Public

    Forked from zoomerxsec/Fake_CVE-2020-1350

    Fake exploit tool, designed to rickroll users attempting to actually exploit.

    Visual Basic .NET