DownrightNifty / gh_hack_PoCLinks
☆63Updated 2 years ago
Alternatives and similar repositories for gh_hack_PoC
Users that are interested in gh_hack_PoC are comparing it to the libraries listed below
Sorting:
- ☆123Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 8 months ago
- WebSocket REPL for pentesters☆220Updated 11 months ago
- ☆80Updated last year
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆110Updated 2 years ago
- ☆115Updated 2 years ago
- ☆204Updated 8 months ago
- ☆86Updated last year
- CQ, a code security scanner☆100Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- Hack-A-Sat Qualifiers Writeups☆252Updated 2 years ago
- Bluetooth Security Assessment Methodology☆133Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆193Updated 9 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆136Updated 2 years ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆71Updated last year
- ☆104Updated 2 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 5 months ago
- ☆134Updated last year
- Proof of concept for DoS exploit☆55Updated last year
- a smart DNS response-guided subdomain fuzzer☆152Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent☆7Updated last year
- A GraphQL enumeration and extraction tool☆131Updated 2 years ago
- ☆33Updated 2 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Write ups for Ph0wn CTF☆42Updated 7 months ago
- Burp HTTP history browser (BHHB) - A tool to view HTTP history exported from Burp Suite Community Edition☆124Updated 7 months ago
- A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, s…☆111Updated 4 years ago