abhiabhi2306 / prototype-pollutionView external linksLinks
Prototype Pollution - A detailed study + hands on lab.
☆15Oct 11, 2022Updated 3 years ago
Alternatives and similar repositories for prototype-pollution
Users that are interested in prototype-pollution are comparing it to the libraries listed below
Sorting:
- Prototype Pollution Lab☆19Nov 20, 2020Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- 2022 CTF public release☆23Jun 15, 2022Updated 3 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- Hard fork of mcguinness/saml-idp; a local SAML Identity Provider (IdP) library to test SAML 2.0 Service Providers (SPs).☆11Oct 8, 2024Updated last year
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 7 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- URL Encode Injection List☆13Sep 20, 2021Updated 4 years ago
- My CTF Challenge☆11Feb 5, 2026Updated last week
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Write-ups cho một số bài trên Reversing.kr☆12Mar 24, 2023Updated 2 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- ☆11Oct 30, 2025Updated 3 months ago
- ☆15Aug 17, 2023Updated 2 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- A tool to combine a PDF and a JPG into one polyglot file which is both a PDF and JPG☆16Dec 8, 2019Updated 6 years ago
- Daily C2 threat intelligence feed☆19Updated this week
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Forensics Science Education☆11Apr 26, 2021Updated 4 years ago
- ☆12Aug 31, 2020Updated 5 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 8 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated last month
- List of android RATs☆13Jan 2, 2021Updated 5 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- My attempt at writing an Operating System from scratch☆13Mar 3, 2023Updated 2 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- Notes I made while preparing for the CRTP certification exam☆13Jul 1, 2021Updated 4 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- Web Application Penetration Testing☆146May 4, 2025Updated 9 months ago
- Create a windows Active Directory lab☆17Oct 29, 2019Updated 6 years ago
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- Creation of multiple Malware tools consisting of evasion, enumeration and exploitation☆56Updated this week
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- CTF WriteUps by team TWC☆16Jun 3, 2025Updated 8 months ago
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago