Lexterl33t / J5afeLinks
Library to set breakpoint into the node of javascript code
☆9Updated last year
Alternatives and similar repositories for J5afe
Users that are interested in J5afe are comparing it to the libraries listed below
Sorting:
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated 9 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated 2 months ago
- ☆47Updated 3 years ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 8 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆53Updated 9 months ago
- Automate Maldoc creation☆22Updated last month
- Dynamically deploy containers for CTF challenges.☆15Updated 3 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆93Updated 4 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆139Updated 2 months ago
- DFIR project to collect and analyze events in Google Workspace☆12Updated last year
- Challenge pour l'édition 2022 du midnight flag☆16Updated 3 years ago
- ☆95Updated 2 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 7 months ago
- Obfuscate the bytes of your payload with an association dictionary☆61Updated last week
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated 10 months ago
- GoLang script that checks for password leaks by sending email address to the BreachDirectory API☆12Updated 3 years ago
- A full CTF Website Server & Frontend | Extremely customizable☆59Updated last year
- Lab used for workshop and CTF☆240Updated 2 weeks ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆260Updated 11 months ago
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆49Updated 5 months ago
- C++ Reflective Assembly Loader☆26Updated 3 months ago
- A generic sysreptor template to write on-premise related Altered Security's certifications reports of compromission.☆15Updated 5 months ago
- Active Directory Enumeration and Exploitation☆11Updated 3 months ago
- Just a few more hacking notes, techniques and tools☆20Updated last week
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆193Updated last month
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆148Updated 3 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆161Updated last month
- Analyse your malware to surgically obfuscate it☆469Updated last week
- ☆17Updated 2 years ago