DownrightNifty / gh_hack_PoCLinks
☆65Updated 3 years ago
Alternatives and similar repositories for gh_hack_PoC
Users that are interested in gh_hack_PoC are comparing it to the libraries listed below
Sorting:
- ☆131Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆140Updated 3 months ago
- CQ, a code security scanner☆99Updated last year
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- WebSocket REPL for pentesters☆233Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- ☆116Updated 2 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆115Updated last year
- a smart DNS response-guided subdomain fuzzer☆156Updated 3 years ago
- ☆207Updated last year
- ☆83Updated last year
- ☆89Updated last year
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆114Updated 3 years ago
- A GraphQL enumeration and extraction tool☆134Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Upload files done during my research.☆169Updated 2 months ago
- ☆104Updated 3 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated 6 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆143Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Updated 3 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆136Updated last year
- A toolbox for extracting RSA private keys from public keys.☆190Updated 4 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Updated 3 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated last year
- Bluetooth Security Assessment Methodology☆147Updated last month
- ☆34Updated 3 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- PoC_CVEs☆169Updated 2 months ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 3 years ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆72Updated last month