Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.
☆33Mar 13, 2018Updated 8 years ago
Alternatives and similar repositories for randomstringutils
Users that are interested in randomstringutils are comparing it to the libraries listed below
Sorting:
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 10 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- GDB functions for debugging and analyzing the PHP heap☆18Feb 3, 2011Updated 15 years ago
- ☆10Jul 21, 2022Updated 3 years ago
- Bytekit is a PHP extension that provides a userspace representation of the opcodes generated by the Zend engine compiler built into PHP.☆19May 21, 2011Updated 14 years ago
- An intercepting proxy, based on Netty☆19Sep 14, 2017Updated 8 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110May 12, 2016Updated 9 years ago
- Boyer-Moore search algorithm in Go☆15Apr 6, 2022Updated 3 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- ☆35Feb 10, 2023Updated 3 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 6 years ago
- libsodium for Universal Windows Platform (UWP) - A secure cryptographic library☆16Jun 24, 2018Updated 7 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- ☆14Nov 16, 2024Updated last year
- ☆34Aug 13, 2021Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Simple process integrity checker Linux kernel module☆15Dec 3, 2020Updated 5 years ago
- A collection of js analysis tools & scripts.☆19Mar 8, 2026Updated last week
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- A proof of concept which generates mutations based on an abstract syntax tree☆15Nov 4, 2016Updated 9 years ago
- ☆153Jun 24, 2019Updated 6 years ago
- Java反序列化漏洞学习笔记☆16Nov 17, 2019Updated 6 years ago
- Plugin for Frida in Binary Ninja☆27May 19, 2021Updated 4 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆103Aug 22, 2019Updated 6 years ago
- Exploit code developed/reproduced by me☆89Jan 25, 2023Updated 3 years ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- Personal notes for Java Deserialization Vulnerability. 对应Java反序列化漏洞利用链集合详解、个人笔记☆18Jan 10, 2022Updated 4 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆65Oct 25, 2016Updated 9 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆142Jul 9, 2024Updated last year
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago