An easy to navigate list of unicode characters that have risky transformations 💥
☆25Mar 22, 2022Updated 4 years ago
Alternatives and similar repositories for unicode-pentester-cheatsheet
Users that are interested in unicode-pentester-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- PHP 8 Sandbox Escape☆78Feb 28, 2026Updated last month
- ☆15May 17, 2018Updated 7 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- ☆29Jan 10, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Material from presentations done by GoSecure researchers☆34Oct 10, 2023Updated 2 years ago
- A collection of XSS Attack vectors☆10Apr 26, 2025Updated 11 months ago
- Blog about HTTP Request Smuggling, including a demo application.☆32Jan 4, 2022Updated 4 years ago
- kerberos in rust for fun and profit☆69Mar 13, 2026Updated 3 weeks ago
- `document.domain` intentionally weakens the only security boundary we have. Perhaps we can dump it?☆17Nov 3, 2023Updated 2 years ago
- A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.☆27Feb 5, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- ☆20Apr 12, 2024Updated last year
- "oh god there are like a million different kinds of analyses, quickly remind me what this one means?"☆19Dec 23, 2020Updated 5 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- ☆12Oct 10, 2024Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- ☆18Jan 7, 2023Updated 3 years ago
- alternative condition variable synchronization primitive☆33Nov 17, 2024Updated last year
- ☆32Dec 5, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Sep 14, 2023Updated 2 years ago
- CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109☆12Sep 13, 2021Updated 4 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- ☆21Nov 30, 2019Updated 6 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- ☆12Aug 8, 2024Updated last year
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 2 years ago
- New exploitation tricks for hardened .NET Remoting servers☆32Aug 5, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆75Feb 11, 2024Updated 2 years ago
- ☆21Sep 12, 2025Updated 6 months ago
- My recommended computer programming book list☆12May 31, 2022Updated 3 years ago
- sonarbyte is a simple and fast subdomain scanner written in go to extract subdomain from Rapid7's DNS Database using omnisint's api.☆27Sep 4, 2022Updated 3 years ago
- Burp Extension for AWS Signing☆92Jan 10, 2025Updated last year
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆42Aug 29, 2023Updated 2 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year