EgeBalci / zippoLinks
Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.
☆25Updated 4 years ago
Alternatives and similar repositories for zippo
Users that are interested in zippo are comparing it to the libraries listed below
Sorting:
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 5 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27Updated 3 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Updated 5 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- Shellcode process injector☆28Updated 5 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- ☆19Updated 5 years ago
- DO NOT RUN THIS.☆47Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Examples of simple code patterns causing BOF☆14Updated 5 years ago
- Red Team C2 and Post Exploitation code☆34Updated 6 months ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 5 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆22Updated 4 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆42Updated 3 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 5 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Updated 7 years ago
- ☆49Updated 5 years ago
- Winsock accept() Backdoor Implant.☆118Updated 4 years ago
- recover Firefox and more browsers logins☆48Updated 4 years ago
- Query various sources for CVE proof-of-concepts☆53Updated 2 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- DNS hijacking via dead records automation tool☆53Updated 5 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- A tool for creating proxy dll for hijacking☆42Updated last year
- Dump exposed HTTP .git fast☆51Updated 3 years ago