DownrightNifty / gh_hack_PoC
☆63Updated last year
Related projects ⓘ
Alternatives and complementary repositories for gh_hack_PoC
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆109Updated last year
- ☆123Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆112Updated 7 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆84Updated last month
- a smart DNS response-guided subdomain fuzzer☆146Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆79Updated 8 months ago
- ☆83Updated 5 months ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆57Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆175Updated last year
- ☆115Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆118Updated 7 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- A GraphQL enumeration and extraction tool☆128Updated last year
- Simple PoC for demonstrating Race Conditions on Websockets☆56Updated last year
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆23Updated 11 months ago
- Nuclei plugins to audit Chrome extensions☆64Updated 4 months ago
- ☆65Updated last month
- Searcher for cross-site leaks (XS-Leaks)☆81Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆62Updated 10 months ago
- A python3 script searching for secret on swaggerhub☆59Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆121Updated 3 weeks ago
- A series of writes about “Binary Exploitation”.☆87Updated last year
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆141Updated last month
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z, jar, war, apk and ipa …☆88Updated 6 months ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆69Updated 9 months ago
- CQ, a code security scanner☆97Updated 6 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆105Updated this week
- Unicode Security Toolkit☆26Updated last month
- Upload files done during my research.☆130Updated this week