A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.
☆13Sep 23, 2017Updated 8 years ago
Alternatives and similar repositories for pickle-prick
Users that are interested in pickle-prick are comparing it to the libraries listed below
Sorting:
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A smali emulator.☆25Jun 27, 2018Updated 7 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- ☆11May 19, 2017Updated 8 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- An offensive attack framework for Distributed Layer of Modern Applications☆85Feb 5, 2020Updated 6 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆60Feb 27, 2019Updated 7 years ago
- Nmap NSE script that captures a screenshot from the host(s) over VNC using vncsnapshot.☆35Aug 18, 2014Updated 11 years ago
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 8 years ago
- ☆68Aug 1, 2017Updated 8 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Nov 17, 2017Updated 8 years ago
- A tool for securing communications between a client and a DNS resolver☆31Jan 22, 2013Updated 13 years ago
- Dusseldorf is an out-of-band security tool to help in security research.☆50Updated this week
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆31Aug 30, 2017Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago