A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654
☆39Apr 21, 2024Updated last year
Alternatives and similar repositories for ShellTorchChecker
Users that are interested in ShellTorchChecker are comparing it to the libraries listed below
Sorting:
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- List your tfsec issues in the QuickFix window with this plugin.☆12May 16, 2022Updated 3 years ago
- ☆10Mar 5, 2018Updated 8 years ago
- Android监控器(Activity异常destroy , 隐私政策合规)☆11Nov 18, 2021Updated 4 years ago
- Tai-e的Web插件☆23Jun 11, 2024Updated last year
- 全国大学生信息安全竞赛作品赛 非官方 LaTex 论文模板☆28Dec 5, 2023Updated 2 years ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆96Jan 20, 2025Updated last year
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- ☆13Jun 15, 2024Updated last year
- ☆33May 27, 2024Updated last year
- nativeRasp that can hook native methods☆23Apr 24, 2023Updated 2 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Apr 1, 2018Updated 7 years ago
- Find context neurons in Pythia models.☆13Jun 13, 2023Updated 2 years ago
- Fuzzing Coreutils with AFL on kubernetes☆13Apr 25, 2019Updated 6 years ago
- A script that sends keypresses to a server that can be injected into XSS-vulnerable websites.☆25Nov 18, 2016Updated 9 years ago
- 🛡️ CyberORDA: Энциклопедия безопасной разработки. Учитесь, делитесь знаниями и делайте AppSec Great Again вместе! ✍️🔒☆52Oct 11, 2025Updated 5 months ago
- 基于UICrawler开源工程,开发的针对android APP 自动化遍历工具,针对hybird或者纯native APP,做深度优先遍历。主要用于监听被抓取APP的页面是否有变动,并生成diff报告☆14Mar 1, 2019Updated 7 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- A repository to store Rad Fingerprinting data.☆24Aug 1, 2024Updated last year
- WallEscape vulnerability in util-linux☆51Mar 30, 2024Updated last year
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection☆13Jul 24, 2022Updated 3 years ago
- PoC for the CVE-2023-49103☆30Dec 2, 2023Updated 2 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- 方便自己搭建codeql环境和数据库的工具。☆64Aug 16, 2025Updated 7 months ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- 一些Java RASP demo☆11Sep 26, 2019Updated 6 years ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆14Mar 1, 2024Updated 2 years ago
- Proof-of-Concept for Authorization Bypass in Next.js Middleware☆19Mar 23, 2025Updated 11 months ago
- MDG-based static vulnerability scanner specialized in analyzing npm packages and detecting taint-style and prototype pollution vulnerabil…☆24Dec 10, 2025Updated 3 months ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- TaintFlow, a framework for JavaScript dynamic information flow analysis.☆18Jan 18, 2023Updated 3 years ago
- Octant plugin for kind☆12Jan 19, 2023Updated 3 years ago
- 《Web安全教程之XXE漏洞》XML External Entity Injection.☆11Nov 1, 2025Updated 4 months ago
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- ☆13Feb 9, 2022Updated 4 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 9 months ago
- Hessian UTF-8 Overlong Encoding☆21Mar 9, 2024Updated 2 years ago
- Add or Delete User via windows api,it can be used when .net is inaccessible.☆39Feb 8, 2020Updated 6 years ago