☆17May 22, 2021Updated 4 years ago
Alternatives and similar repositories for defihack
Users that are interested in defihack are comparing it to the libraries listed below
Sorting:
- Practical Jupyter notebooks from Andrew Ng and Giskard team's "Red Teaming LLM Applications" course on DeepLearning.AI.☆23Apr 8, 2024Updated last year
- ☆20Sep 5, 2020Updated 5 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Dec 10, 2022Updated 3 years ago
- ☆30Sep 13, 2021Updated 4 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- ☆34Jan 15, 2021Updated 5 years ago
- A tampered payload generator to Fuzz Web Application Firewalls☆34Nov 4, 2019Updated 6 years ago
- To host ProcessMaker v3 Community Editions☆10Jun 18, 2024Updated last year
- ☆12Jul 4, 2024Updated last year
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- ☆14Feb 19, 2023Updated 3 years ago
- ☆10Mar 6, 2023Updated 3 years ago
- Artifical-intelligence☆10Dec 27, 2022Updated 3 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- ☆12Feb 16, 2012Updated 14 years ago
- ☆10Mar 11, 2024Updated last year
- Twitter follower graphs of @Die_Gruenen & @AfD, including cluster and topic analysis☆10Jul 10, 2020Updated 5 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Because Github needs cybermoney, y'all!☆11Feb 6, 2018Updated 8 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 5 years ago
- Verify and decrypt .NET's .ASPXAUTH cookie from node.☆12Jul 18, 2023Updated 2 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve☆15Jul 16, 2022Updated 3 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- Ready to use blueprint project for creating and deploying a soulbound NFT collection contract on the TON blockchain using Tact programmin…☆12Sep 30, 2024Updated last year
- A tool to convert smali codes to java-like codes☆23May 6, 2015Updated 10 years ago
- windows Local privilege escalation for xp sp3+ (x86/x64)☆12Oct 26, 2017Updated 8 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- Simple Dapp for sending & requesting Ether☆10Jun 16, 2018Updated 7 years ago
- ☆14Jun 27, 2022Updated 3 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago