DownrightNifty / gh_hack_PoC
☆63Updated 2 years ago
Alternatives and similar repositories for gh_hack_PoC
Users that are interested in gh_hack_PoC are comparing it to the libraries listed below
Sorting:
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆110Updated 2 years ago
- ☆123Updated last year
- ☆203Updated 6 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- ☆85Updated 10 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆130Updated 2 years ago
- CQ, a code security scanner☆100Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆72Updated last year
- ☆114Updated last year
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆93Updated 3 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- Repository to store exploits created by Assetnotes Security Research team☆178Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- A tool to inspect and attack version 1 GUIDs☆221Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- ☆104Updated 2 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆173Updated last year
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆101Updated last week
- Automated privilege escalation of the world's most popular Docker images.☆66Updated last year
- ☆78Updated last year
- CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent☆6Updated last year
- Upload files done during my research.☆159Updated last month
- Slides and videos from my public speeches / conferences☆74Updated last month
- CVE-2023-4911 proof of concept☆168Updated last year
- ☆32Updated 2 years ago
- The following package is the standalone wordlist-only component to flask-unsign.☆39Updated 11 months ago
- WallEscape vulnerability in util-linux☆51Updated last year