J4FSec / Research_PapersLinks
☆16Updated 4 years ago
Alternatives and similar repositories for Research_Papers
Users that are interested in Research_Papers are comparing it to the libraries listed below
Sorting:
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- CATANA - CUT your Wordlist!☆15Updated 3 years ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆45Updated 2 months ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated last year
- Python TCP server for terminal rickrolls☆13Updated 4 years ago
- Hayden Housen's solutions to the 2022 PicoCTF Competition☆10Updated 3 years ago
- Tool for extracting credentials locally stored by web browsers☆36Updated 3 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- CVE-2025-56383-Proof-of-Concept☆54Updated 3 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Python3 script to dump breach data from Dehashed☆38Updated 6 months ago
- ☆24Updated 11 months ago
- A tool to dump exposed .git repositories☆73Updated 7 months ago
- ☆33Updated 3 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- A powerful and delightful PHP WebShell☆66Updated 10 months ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.