☆19Jun 22, 2015Updated 10 years ago
Alternatives and similar repositories for iPadRestrictionsCodeBypass
Users that are interested in iPadRestrictionsCodeBypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 11 years ago
- Windows API Hashes used in the malwares☆42Aug 7, 2015Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Detect credit card exposures with Bro☆15Nov 12, 2023Updated 2 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 10 years ago
- Alternative hexdump.☆15Feb 4, 2016Updated 10 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- A sample AWS Lambda function to push EC2 Auto Scaling notifications to IFTTT via the Maker channel☆21Jul 26, 2015Updated 10 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆34Dec 22, 2014Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Some tools for EFI hackery☆41Feb 25, 2012Updated 14 years ago
- sideload apps quickly with an Apple Developer account☆17Jul 26, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- GDB commands to aid exploit development☆46Sep 9, 2016Updated 9 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- An x86 PC emulator☆23Feb 22, 2013Updated 13 years ago
- PS Vita Webkit Exploit / Mini SDK and Testing Framework☆35Nov 6, 2014Updated 11 years ago
- File Shooter (uv_link_t, uv_ssl_t, uv_http_t)☆11Jul 8, 2016Updated 9 years ago
- Collection of scripts for radare2☆27Jan 1, 2019Updated 7 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆109Apr 13, 2016Updated 10 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Mach Fuzzing Tools☆32Oct 24, 2013Updated 12 years ago
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- Collection of tools for privesc on Linux☆34Aug 28, 2013Updated 12 years ago
- in-memory fuzzing with gdb☆21Feb 10, 2016Updated 10 years ago
- Dump page tables on various OSes and analyze them☆31Jan 15, 2016Updated 10 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 11 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago