Pr0x13 / CVE-2014-4377Links
☆13Updated 10 years ago
Alternatives and similar repositories for CVE-2014-4377
Users that are interested in CVE-2014-4377 are comparing it to the libraries listed below
Sorting:
- ☆12Updated 10 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Network white noise collector☆19Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- various exploits☆31Updated 12 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 9 years ago
- For BurpSuite Plugins☆11Updated 10 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- iOS forensics utility☆12Updated 7 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 8 years ago
- Scripts used for phishing campaigns☆14Updated 10 years ago
- Service desk password tools.☆16Updated 8 years ago
- iOS 12.0 -> 12.1.2 _kernproc and _rootvnode offsets for 16K devices☆11Updated 6 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Updated 10 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 9 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Educational Python penetration testing framework☆9Updated 7 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago