DownrightNifty / gh_hack_PoCLinks
☆65Updated 3 years ago
Alternatives and similar repositories for gh_hack_PoC
Users that are interested in gh_hack_PoC are comparing it to the libraries listed below
Sorting:
- ☆130Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆139Updated 2 months ago
- CQ, a code security scanner☆100Updated last year
- ☆82Updated last year
- ☆88Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆114Updated last year
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- a smart DNS response-guided subdomain fuzzer☆156Updated 3 years ago
- ☆116Updated 2 years ago
- ☆33Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- Upload files done during my research.☆168Updated 3 weeks ago
- WebSocket REPL for pentesters☆231Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- ☆207Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆143Updated 3 years ago
- ☆104Updated 3 years ago
- Write ups for Ph0wn CTF☆47Updated 4 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated 5 months ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆91Updated 3 years ago
- Bluetooth Security Assessment Methodology☆143Updated last year
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 3 years ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆47Updated 2 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆135Updated last year
- ☆136Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆164Updated 2 months ago
- ☆35Updated last year
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆112Updated 7 months ago