An easy to navigate list of unicode characters that have risky transformations 💥
☆25Mar 22, 2022Updated 3 years ago
Alternatives and similar repositories for unicode-pentester-cheatsheet
Users that are interested in unicode-pentester-cheatsheet are comparing it to the libraries listed below
Sorting:
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- PHP 8 Sandbox Escape☆68Feb 28, 2026Updated 2 weeks ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- ☆29Jan 10, 2023Updated 3 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- A collection of XSS Attack vectors☆10Apr 26, 2025Updated 10 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆32Jan 4, 2022Updated 4 years ago
- ☆27Feb 3, 2026Updated last month
- kerberos in rust for fun and profit☆51Mar 13, 2026Updated last week
- Workshop given at Hack in Paris 2019☆126Jun 8, 2023Updated 2 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- ☆12Oct 10, 2024Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- Public repo for ETH Escape CTF @ Devcon 2024: https://devcon.org/☆13Dec 11, 2024Updated last year
- Disputify - Visualisation for fault dispute games.☆12Jul 22, 2023Updated 2 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- Exploiting CVE-2016-2334 7zip HFS+ vulnerability☆10Nov 29, 2017Updated 8 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- ☆10Sep 11, 2021Updated 4 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Mar 4, 2022Updated 4 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- ☆12Aug 8, 2024Updated last year
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 2 years ago
- ☆75Feb 11, 2024Updated 2 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- ☆13Nov 14, 2024Updated last year
- ☠️ Code for the Defcon Workshop☆23Aug 6, 2024Updated last year
- ☆21Sep 12, 2025Updated 6 months ago
- sonarbyte is a simple and fast subdomain scanner written in go to extract subdomain from Rapid7's DNS Database using omnisint's api.☆27Sep 4, 2022Updated 3 years ago
- Burp Extension for AWS Signing☆92Jan 10, 2025Updated last year
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆42Aug 29, 2023Updated 2 years ago
- Antiscan.me automatization script☆30May 21, 2024Updated last year
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆108Jan 26, 2020Updated 6 years ago