PeoKass / dsasd
☆4Updated 5 years ago
Alternatives and similar repositories for dsasd:
Users that are interested in dsasd are comparing it to the libraries listed below
- ☆10Updated 10 months ago
- ☆9Updated 4 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆185Updated 10 months ago
- ☆5Updated last year
- Golang PE injection on windows☆167Updated 3 years ago
- PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE☆250Updated 5 years ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆11Updated 3 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆144Updated 2 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- Course materials for Malware Analysis by RPISEC☆10Updated 7 years ago
- HTA encryption tool for RedTeams☆1,385Updated 2 years ago
- ☆14Updated 3 weeks ago
- Research on abusing GitLab Runners☆25Updated 4 years ago
- Take over macOS Electron apps' TCC permissions☆200Updated last year
- Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!☆376Updated 2 weeks ago
- VBScript obfuscation to allow PenTesters bypass countermeasures.☆121Updated 2 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- AirHopper Attack Reproduce☆15Updated 6 years ago
- ☆199Updated 5 months ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆987Updated 7 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆124Updated 4 years ago
- Application and Service Fingerprinting☆132Updated 2 years ago
- BSidesSF CTF 2019 release☆71Updated 2 years ago
- ☆20Updated 7 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆194Updated 4 years ago
- Sleepy Puppy XSS Payload Management Framework☆1,039Updated 6 years ago
- Post module for Metasploit to execute ELF in memory☆85Updated 6 years ago
- Post Exploitation Collection☆1,561Updated 4 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆507Updated 11 months ago