DownrightNifty / gh_hack_PoCLinks
☆65Updated 3 years ago
Alternatives and similar repositories for gh_hack_PoC
Users that are interested in gh_hack_PoC are comparing it to the libraries listed below
Sorting:
- ☆131Updated 2 years ago
- ☆83Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆140Updated 3 months ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- ☆88Updated last year
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆114Updated 2 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆115Updated last year
- CQ, a code security scanner☆100Updated last year
- WebSocket REPL for pentesters☆233Updated last year
- ☆116Updated 2 years ago
- ☆207Updated last year
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆175Updated 5 months ago
- Upload files done during my research.☆169Updated last month
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 11 months ago
- ☆137Updated last year
- Bluetooth Security Assessment Methodology☆147Updated 2 weeks ago
- ☆34Updated 2 years ago
- HTML Universal Identifier☆65Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆143Updated 3 years ago
- Write ups for Ph0wn CTF☆47Updated 5 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated 2 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- An automatic Blind ROP exploitation tool☆206Updated 2 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆134Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆113Updated 8 months ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆27Updated 3 years ago
- ☆79Updated last year