Lexterl33t / J5afe
Library to set breakpoint into the node of javascript code
☆9Updated last year
Alternatives and similar repositories for J5afe:
Users that are interested in J5afe are comparing it to the libraries listed below
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 2 weeks ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆41Updated 7 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago
- Dynamically deploy containers for CTF challenges.☆14Updated last month
- ☆44Updated 3 years ago
- ☆17Updated last year
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 7 months ago
- GoLang script that checks for password leaks by sending email address to the BreachDirectory API☆12Updated 3 years ago
- ☆92Updated 3 weeks ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆77Updated 2 weeks ago
- DFIR project to collect and analyze events in Google Workspace☆12Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated 2 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆51Updated 7 months ago
- C++ Reflective Assembly Loader☆22Updated last month
- Active Directory Enumeration and Exploitation☆11Updated last month
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 6 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆127Updated 2 weeks ago
- A generic sysreptor template to write on-premise related Altered Security's certifications reports of compromission.☆13Updated 3 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆52Updated 4 months ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated 9 months ago
- A PowerShell console in C/C++ with all the security features disabled☆225Updated 3 weeks ago
- A python script to automatically generate shellcode payload from assembly files.☆13Updated 2 years ago
- Pentest report framework without data send☆16Updated 6 months ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆14Updated last year
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆23Updated 4 months ago
- ☆29Updated 7 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆99Updated last year
- Lab used for workshop and CTF☆178Updated 2 months ago
- Obfuscate the bytes of your payload with an association dictionary☆34Updated 4 months ago