DownrightNifty / gh_hack_PoCLinks
☆64Updated 2 years ago
Alternatives and similar repositories for gh_hack_PoC
Users that are interested in gh_hack_PoC are comparing it to the libraries listed below
Sorting:
- ☆128Updated 2 years ago
- ☆81Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆135Updated 2 weeks ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- ☆206Updated last year
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- WebSocket REPL for pentesters☆226Updated last year
- 🏄♂️ Decode and analyze protobuf efficiently.☆132Updated last year
- CQ, a code security scanner☆100Updated last year
- ☆88Updated last year
- ☆104Updated 3 years ago
- ☆116Updated 2 years ago
- Write ups for Ph0wn CTF☆47Updated 2 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated 2 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- a smart DNS response-guided subdomain fuzzer☆156Updated 2 years ago
- ☆79Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- Upload files done during my research.☆166Updated 6 months ago
- Scapy hands-on☆34Updated last year
- ☆33Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- ☆135Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 3 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆90Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆139Updated 3 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated 2 years ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year