Dexaran's Naming Service
☆20Mar 22, 2023Updated 2 years ago
Alternatives and similar repositories for DexNS
Users that are interested in DexNS are comparing it to the libraries listed below
Sorting:
- Truffle, Webpack, Web3, Redux and React boilerplate.☆12Aug 27, 2024Updated last year
- Ethereum Classic blockchain interaction web tool.☆14Mar 22, 2023Updated 2 years ago
- Callisto Snapshot script and result☆11Mar 22, 2023Updated 2 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- ☆12Nov 9, 2017Updated 8 years ago
- Complete examples of solidity exploits☆13Oct 17, 2017Updated 8 years ago
- Weekly industry summary☆17Apr 27, 2018Updated 7 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- public exploits☆35May 11, 2023Updated 2 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- ☆22Oct 13, 2017Updated 8 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- Official Go implementation of the Callisto protocol (CLO main client)☆45Oct 22, 2024Updated last year
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Nov 12, 2014Updated 11 years ago
- ☆54Feb 27, 2017Updated 9 years ago
- A library for interacting with Ethereum: https://medium.com/buyethdomains/introducing-browseth-a-new-library-for-interacting-with-ethereu…☆25Jun 18, 2025Updated 8 months ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- Malware management program and tools☆27Dec 16, 2015Updated 10 years ago
- !!!不建议使用了,可以使用AuditBeat!!! Linux服务器命令监控辅助脚本,ElasticSearch + Logstash + Kibana + Redis + Auditd☆28Apr 10, 2019Updated 6 years ago
- DNS log http://zone.wooyun.org/content/27119☆21May 10, 2016Updated 9 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- PoC for wget v1.19.1☆52Feb 2, 2018Updated 8 years ago
- it-security related scripts and tools☆25Jun 7, 2019Updated 6 years ago
- From Windows SDK☆58Oct 9, 2017Updated 8 years ago
- Weak password☆24Nov 7, 2017Updated 8 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- ☆20Oct 22, 2019Updated 6 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Jul 25, 2021Updated 4 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago