Paradoxis / Flask-Unsign-WordlistView external linksLinks
The following package is the standalone wordlist-only component to flask-unsign.
☆44Jun 15, 2024Updated last year
Alternatives and similar repositories for Flask-Unsign-Wordlist
Users that are interested in Flask-Unsign-Wordlist are comparing it to the libraries listed below
Sorting:
- "Useable" tool to share secrets via shamir secret sharing and NaCL.☆14Sep 19, 2018Updated 7 years ago
- ☆12Dec 3, 2022Updated 3 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- a shared short domain for XSS and other hacks☆32Mar 3, 2022Updated 3 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- Webinterface to execute and see the output of shellbased webscanning software, but honestly would work with every shell program.☆12Apr 9, 2019Updated 6 years ago
- ☆18Sep 24, 2024Updated last year
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆56Oct 23, 2024Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆35Jan 26, 2022Updated 4 years ago
- ☆15Dec 16, 2021Updated 4 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆17Mar 20, 2023Updated 2 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.☆18Mar 19, 2018Updated 7 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Capture The Flag Marker System☆17Oct 21, 2018Updated 7 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- QUIC tunnel☆15Oct 28, 2017Updated 8 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- basic proxy as an azure function serverless app☆18Jan 12, 2023Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆67Apr 25, 2025Updated 9 months ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated last month
- ☆24Sep 26, 2021Updated 4 years ago
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆16May 15, 2020Updated 5 years ago
- A Go scraper that validates security.txt files and outputs them in the disclose.io JSON format.☆23May 18, 2025Updated 8 months ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Jan 12, 2025Updated last year
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innov…☆27Mar 12, 2025Updated 11 months ago
- WireGuard VPN server GUI with Status page☆17Oct 5, 2021Updated 4 years ago
- Easy peasy file uploads☆33Aug 29, 2025Updated 5 months ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago