Safari local file reader
☆122Oct 22, 2018Updated 7 years ago
Alternatives and similar repositories for Safiler
Users that are interested in Safiler are comparing it to the libraries listed below
Sorting:
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- ☆46May 15, 2016Updated 9 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- 用于快速探测未授权MongoDB数据库结构,取第一条内容,并统计数据数量。A tool for unauthorized MongoDB database , take the first content, and the number of statistical da…☆26Dec 5, 2016Updated 9 years ago
- 一个半自动化命令注入漏洞Fuzz工具(One Semi-automation command injection vulnerability Fuzz tool)☆92Sep 28, 2017Updated 8 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- wiki.wooyun.org的部分快照网页☆80Oct 19, 2016Updated 9 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆140Apr 29, 2020Updated 5 years ago
- Burp Suite Attack Selector Plugin☆60Nov 23, 2017Updated 8 years ago
- Webkit uxss exploit (CVE-2017-7089)☆63Oct 3, 2017Updated 8 years ago
- A tiny and cute URL fuzzer☆402Nov 10, 2022Updated 3 years ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- An implementation of the DNS rebinding attack.☆16Apr 14, 2017Updated 8 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- ☆35Nov 2, 2022Updated 3 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- 从扫描器结果分离出的一些大公司泛解析ip列表☆60Jun 8, 2017Updated 8 years ago
- ☆86Feb 28, 2017Updated 9 years ago
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆206Feb 15, 2024Updated 2 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Testing vulnerabilities in devices and routers connected to the Internet.☆63Nov 19, 2015Updated 10 years ago
- Tornado Demo Vulnerable Application to test SQL injection vulnerability and patch it using RASP (Runtime Application Self-Protection)☆11Nov 15, 2017Updated 8 years ago
- Small cyberspace search engine☆41Aug 28, 2020Updated 5 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Jun 30, 2018Updated 7 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Feb 25, 2023Updated 3 years ago