Parsing PHP source code using Python and generating ASTs
☆19Jul 9, 2024Updated last year
Alternatives and similar repositories for PHP-Parsers
Users that are interested in PHP-Parsers are comparing it to the libraries listed below
Sorting:
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Resources for Code Cafe Online 4th May 2020☆11May 5, 2020Updated 5 years ago
- Emulate the AWS IoT Button on a Raspberry Pi with a simple push button using this C++ sample☆10Sep 16, 2016Updated 9 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Spring Cloud Function Vulnerable Application / CVE-2022-22963☆19Apr 1, 2022Updated 3 years ago
- JavaScript source map parser and extractor written in Python☆24Aug 6, 2019Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Aug 25, 2018Updated 7 years ago
- CVE PoCs☆21Jul 16, 2020Updated 5 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- This is the Android device configuration for Sony Xperia XZ1 Compact (yoshino platform).☆10May 30, 2025Updated 9 months ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- A curated list of Docker resources and projects☆16Nov 15, 2025Updated 4 months ago
- This is a mapping of CPEs to package urls created by using VulnerableCode's data☆10Aug 14, 2020Updated 5 years ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- Nessus Vulnerability Scanner in a Docker container☆10Sep 25, 2018Updated 7 years ago
- moved to: https://github.com/alphaSeclab/awesome-reverse-engineering☆21Nov 25, 2019Updated 6 years ago
- shellinabox for docker based on alpine linux☆12Sep 17, 2021Updated 4 years ago
- Public BanditFuzz Repo☆12Jan 12, 2021Updated 5 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- ☆13Apr 27, 2018Updated 7 years ago
- openvpn server configs☆15May 12, 2016Updated 9 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 7 years ago
- dbg.vim is vim scipt for debug the program. (support cdb, gdb, jdb,fdb,mdbg)☆35Jul 17, 2015Updated 10 years ago
- A tool to check for rogue/orphaned AWS services running that cost money☆14Dec 21, 2017Updated 8 years ago
- HTML2POP3 is a virtual POP3, SMTP and NNTP server☆13Mar 11, 2026Updated last week
- MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )☆11Feb 23, 2016Updated 10 years ago
- Convert shell scripts to Ansible scripts with limiations☆20Nov 1, 2016Updated 9 years ago
- Tools for all things related to Combinatory Categorial Grammar☆20Jul 12, 2025Updated 8 months ago
- Example server providing JWT tokens for ChartMuseum auth☆20Jan 28, 2021Updated 5 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- ldid and ldid2☆14Jun 25, 2018Updated 7 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- Web based shell with configurable authentication☆15Apr 3, 2016Updated 9 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326☆20Mar 16, 2022Updated 4 years ago