akabe1 / upnp-bhunterView external linksLinks
Burp Suite Extension useful to inspect UPnP security
☆16Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for upnp-bhunter
Users that are interested in upnp-bhunter are comparing it to the libraries listed below
Sorting:
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Aug 19, 2021Updated 4 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Collection of tools to interact with Intigriti website☆16Aug 10, 2024Updated last year
- A vnc client dll for c#, written in c/c++ and c#, depends on TightVnc 2.7.10, so it can use Tight to push screen faster than vncsharp use…☆18Nov 18, 2019Updated 6 years ago
- Real-time chat without using Javascript.☆18Feb 7, 2018Updated 8 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Bare template for a Kernel Mode Driver☆51Mar 10, 2020Updated 5 years ago
- GQL Burp Extension☆21Sep 16, 2022Updated 3 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- ☆12May 13, 2020Updated 5 years ago
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆33Jan 20, 2026Updated 3 weeks ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Sep 2, 2021Updated 4 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- jre8u20 gadget☆34May 23, 2021Updated 4 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- Breaking git with a carriage return and cloning RCE☆50Jul 8, 2025Updated 7 months ago
- ☆32May 30, 2019Updated 6 years ago
- ☆32Aug 16, 2020Updated 5 years ago
- ☆38Jul 3, 2020Updated 5 years ago
- Cobalt Strike < 4.4 dos CVE-2021-36798☆37Aug 19, 2021Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Sep 23, 2021Updated 4 years ago
- Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4☆12Apr 11, 2024Updated last year
- Blockchain Reader Library☆10Jan 20, 2024Updated 2 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- The react website to provide live update link for coin master app☆15Feb 28, 2023Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Export Tweets from Twitter into JSON file then publish as a Graph objects in Neo4j DB☆10Dec 7, 2018Updated 7 years ago
- Python3 Module to interact with the SonicWall® SonicOS API☆14Jan 6, 2025Updated last year
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- A sexy binary protocol written in c with zero-allocations☆11Dec 13, 2025Updated 2 months ago
- A Simple Kiosk application built using Flutter☆13Feb 28, 2022Updated 3 years ago
- ☆10Feb 11, 2025Updated last year
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago