Bugs, but rewarded
☆22Dec 10, 2025Updated 4 months ago
Alternatives and similar repositories for yublueflower
Users that are interested in yublueflower are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆81Jul 25, 2025Updated 9 months ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆46Jul 9, 2025Updated 9 months ago
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A chrome extension that shows the time but steals the cookies in the back for demonstration purposes.☆24Mar 10, 2025Updated last year
- ☆13Mar 4, 2021Updated 5 years ago
- ☆18Jan 14, 2026Updated 3 months ago
- this module will automatically create evil twin and store password that user input☆15Jan 26, 2023Updated 3 years ago
- This repository contains examples of information security policies, GDPR protocols and an operational security guide with examples of bes…☆13Apr 21, 2026Updated last week
- xrecon is a powerful web fingerprinting tool with CDN detection capabilities☆43Aug 14, 2024Updated last year
- Alerting engine (slack etc) for testssl.sh JSON result output files☆16Jul 10, 2019Updated 6 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆94Apr 1, 2026Updated 3 weeks ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 4 years ago
- Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)☆17Feb 22, 2026Updated 2 months ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated 2 years ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆28Aug 7, 2024Updated last year
- Spring4Shell reproduce☆11Apr 1, 2022Updated 4 years ago
- ☆13Nov 17, 2021Updated 4 years ago
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Oct 30, 2024Updated last year
- ☆11May 11, 2024Updated last year
- ☆16Nov 26, 2024Updated last year
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated 2 years ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 10 months ago
- A persistant Windows Service Proof of Concept, where the Service will run after Restart or Shutdown, and invoke a given software executab…☆37Sep 28, 2023Updated 2 years ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated 3 months ago
- ☆11Aug 12, 2025Updated 8 months ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Apr 8, 2026Updated 3 weeks ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆10Mar 31, 2024Updated 2 years ago
- ☆11Mar 26, 2024Updated 2 years ago
- All Items Related to bug bounty☆13Aug 8, 2025Updated 8 months ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆122Oct 19, 2025Updated 6 months ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 7 months ago
- A simple personal website stack☆15Apr 8, 2026Updated 3 weeks ago
- ☆111Feb 7, 2026Updated 2 months ago