Bugs, but rewarded
☆22Dec 10, 2025Updated 5 months ago
Alternatives and similar repositories for yublueflower
Users that are interested in yublueflower are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆82Jul 25, 2025Updated 9 months ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆46Jul 9, 2025Updated 10 months ago
- A chrome extension that shows the time but steals the cookies in the back for demonstration purposes.☆24Mar 10, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Mar 4, 2021Updated 5 years ago
- ☆17Jan 14, 2026Updated 4 months ago
- This repository contains examples of information security policies, GDPR protocols and an operational security guide with examples of bes…☆13Apr 21, 2026Updated 3 weeks ago
- xrecon is a powerful web fingerprinting tool with CDN detection capabilities☆43Aug 14, 2024Updated last year
- ☆21May 14, 2026Updated last week
- Alerting engine (slack etc) for testssl.sh JSON result output files☆16Jul 10, 2019Updated 6 years ago
- 🏠 my dotfiles☆19Oct 18, 2024Updated last year
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- CVE-2022-25636 exploit rewritten with pipe primitive☆19Apr 5, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆95Apr 1, 2026Updated last month
- Extract Everything. Decompress entire folders filled with archives.☆24May 7, 2026Updated last week
- CVE-2022-0185 exploit rewritten with pipe primitive☆16Apr 5, 2022Updated 4 years ago
- Mazer for CodeIgniter☆32Jan 24, 2023Updated 3 years ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated 2 years ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆28Aug 7, 2024Updated last year
- High-performance DNS forwarder with caching, client/domain-based routing, hot-reloadable rules from folder, Prometheus metrics, and Docke…☆35Jan 15, 2026Updated 4 months ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- Spring4Shell reproduce☆11Apr 1, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆13Jun 8, 2024Updated last year
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Oct 30, 2024Updated last year
- ☆11May 11, 2024Updated 2 years ago
- ☆16May 5, 2026Updated 2 weeks ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆17Mar 17, 2024Updated 2 years ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 11 months ago
- A persistant Windows Service Proof of Concept, where the Service will run after Restart or Shutdown, and invoke a given software executab…☆37Sep 28, 2023Updated 2 years ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆24Jan 13, 2026Updated 4 months ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35May 12, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Mar 26, 2024Updated 2 years ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 8 months ago
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library☆33Sep 23, 2022Updated 3 years ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆124Oct 19, 2025Updated 7 months ago
- A simple personal website stack☆16Apr 8, 2026Updated last month
- A tool for brute-forcing HTTP authentication (for CTFs and pentesting)☆11Dec 20, 2022Updated 3 years ago
- ☆52Sep 1, 2025Updated 8 months ago