Read physical memory from other virtual machines using CPU vulnerabilities
☆59Dec 31, 2025Updated last month
Alternatives and similar repositories for l1tf_reloaded
Users that are interested in l1tf_reloaded are comparing it to the libraries listed below
Sorting:
- AI-powered assistant that integrates seamlessly with Caido☆54Feb 20, 2026Updated last week
- Easily create and share Proof of Concepts in HTML, JavaScript, etc. with custom headers, all via query parameters☆13Oct 1, 2025Updated 4 months ago
- A lightweight and minimal Python-based web application that simplifies OpenStack resource allocation information.☆14Jul 29, 2025Updated 7 months ago
- ☆12Jul 14, 2025Updated 7 months ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- SSH Client/Server Library☆15Feb 9, 2026Updated 2 weeks ago
- SOS Flashlight App turns your phone into a Morse code signaling device, capable of transmitting emergency messages or custom text through…☆22Jan 3, 2026Updated last month
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- PostgreSQL Rock Solid Database - "ACID" artworks☆11Nov 10, 2019Updated 6 years ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆10Mar 18, 2019Updated 6 years ago
- ☆13Jul 10, 2025Updated 7 months ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- ☆24Apr 18, 2025Updated 10 months ago
- Yet another PyQt4/PyQt5 compatibility layer☆13Nov 25, 2025Updated 3 months ago
- Just some exams☆10Jun 20, 2022Updated 3 years ago
- git://git.code.sf.net/p/xmlstar/code☆15Feb 4, 2018Updated 8 years ago
- SQL injection detection engine by tokenzing and syntax analysis, like SQLChop☆10May 8, 2017Updated 8 years ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 7 months ago
- Linux Traffic Control (TC) based implementation of Kubernetes NPWG MultiNetworkPolicy API☆12Jul 20, 2023Updated 2 years ago
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Jul 28, 2025Updated 6 months ago
- Python implementation of MD5 and Length Extension Attack (LEA)☆10Feb 20, 2018Updated 8 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- Small cyber challenges for fun and no profit☆13May 20, 2025Updated 9 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Slim dockerized Android ndk☆12Mar 3, 2023Updated 2 years ago
- BurpSuite extension that helps find user input in a GWT body.☆12May 29, 2020Updated 5 years ago
- ssrf_proxy☆13Jun 9, 2023Updated 2 years ago
- Receiver for 2.4ghz remotes☆13Mar 8, 2021Updated 4 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- An implementation of the DNS rebinding attack.☆16Apr 14, 2017Updated 8 years ago
- ☆14Feb 12, 2026Updated 2 weeks ago
- ☆16Apr 27, 2023Updated 2 years ago
- Exploit app for CVE-2021-39670 and CVE-2021-39690, two permanent denial-of-service vulnerabilities in Android's wallpaper system☆14Mar 3, 2023Updated 2 years ago
- Convert an IP into Alternative / Obfuscated versions of itself☆14Aug 13, 2022Updated 3 years ago
- This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Servi…☆15Apr 1, 2023Updated 2 years ago
- Moved to https://github.com/msm89x7-mainline☆13Jun 15, 2020Updated 5 years ago
- A tool to Peek Intent from Notification.contentIntent, as a demo for app_process☆16Aug 30, 2017Updated 8 years ago