DownrightNifty / gh_hack_PoCLinks
☆63Updated 2 years ago
Alternatives and similar repositories for gh_hack_PoC
Users that are interested in gh_hack_PoC are comparing it to the libraries listed below
Sorting:
- ☆125Updated last year
- ☆80Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆131Updated 10 months ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- ☆87Updated last year
- Upload files done during my research.☆164Updated 4 months ago
- CQ, a code security scanner☆100Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- WebSocket REPL for pentesters☆223Updated last year
- ☆205Updated 10 months ago
- ☆116Updated 2 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆137Updated 2 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated 3 weeks ago
- Write ups for Ph0wn CTF☆44Updated 2 weeks ago
- ☆79Updated last year
- a smart DNS response-guided subdomain fuzzer☆153Updated 2 years ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆126Updated 10 months ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- PoC_CVEs☆163Updated last month
- ☆33Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Local Privilege Escalation in polkit's pkexec☆74Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆89Updated 2 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆40Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆11Updated 10 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 3 years ago