☆19Apr 28, 2024Updated last year
Alternatives and similar repositories for command-injection-tester
Users that are interested in command-injection-tester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Email Analysis Toolkit☆26Sep 21, 2021Updated 4 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- 😴 关于不让我弟一直玩游戏,定时要求他休息才写的小玩意。☆10Sep 4, 2021Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Exploiting XSS with Javascript/JPEG Polyglot (by @medusa_0xf)☆21Apr 8, 2022Updated 3 years ago
- system pseudo protocals digger for windows -- Windows 系统下的伪协议查看工具☆17Dec 22, 2016Updated 9 years ago
- ☆27Mar 5, 2023Updated 3 years ago
- ☆16Aug 19, 2024Updated last year
- A generic decorator based ssh protocol message fuzzer based paramiko the Native Python SSHv2 protocol library☆13Jan 2, 2020Updated 6 years ago
- 破解CS4.0☆16Feb 14, 2022Updated 4 years ago
- A Rust crate that defines the ToBoundedStatic and IntoBoundedStatic traits☆20Mar 7, 2026Updated 2 weeks ago
- DeJITLeak: Eliminating JIT-Induced Timing Side-Channel Leaks☆15Sep 15, 2022Updated 3 years ago
- None of the exploit code or research is my own but all available in public domain☆26Jun 9, 2019Updated 6 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- PoC CVE-2020-6308☆36Dec 29, 2020Updated 5 years ago
- neo4j plugin of ByteCodeDL for the IntelliJ Platform. ByteCodeDL-Neo4j-IDEA-Plugin☆16Dec 28, 2023Updated 2 years ago
- A simple setup for Munki. Mac and Linux supported.☆14Dec 14, 2023Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago
- A domain recon tool to help detect DNS based vulnerabilities, such as zone transfers and subdomain takeovers.☆11Mar 25, 2022Updated 3 years ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Plain Python implementation of the MySQL protocol. It uses asyncio, so works only with Python 3.3+. It only implements the server partfor…☆14Feb 28, 2015Updated 11 years ago
- generate facts from bytecode (source is https://github.com/plast-lab/doop-mirror/tree/master/generators)☆23Nov 24, 2024Updated last year
- ☆11Jun 30, 2016Updated 9 years ago
- A method for parsing Snort Barnyard2 logs from pfSense in Graylog☆10May 26, 2020Updated 5 years ago
- ☆26Mar 11, 2025Updated last year
- Brew Local Privilege Escalation exploit on Intel macOS☆19Mar 6, 2024Updated 2 years ago
- Vim-like hex editor.☆14Jun 22, 2022Updated 3 years ago
- DNS Profile Generator for Apple devices.☆59Mar 14, 2026Updated last week
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Jun 30, 2015Updated 10 years ago
- 编写一个简单的linux kernel rootkit☆24Aug 7, 2022Updated 3 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Android tapjacking quick PoC tool☆37Nov 3, 2022Updated 3 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- ☆18Jan 18, 2022Updated 4 years ago
- Reference manual for the RustCrypto project, implemented as an MDBook [WIP]☆22Jan 18, 2024Updated 2 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago