Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.
☆33Mar 13, 2018Updated 8 years ago
Alternatives and similar repositories for randomstringutils
Users that are interested in randomstringutils are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 11 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- GDB functions for debugging and analyzing the PHP heap☆18Feb 3, 2011Updated 15 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆10Jul 21, 2022Updated 3 years ago
- Bytekit is a PHP extension that provides a userspace representation of the opcodes generated by the Zend engine compiler built into PHP.☆19May 21, 2011Updated 14 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 14 years ago
- ☆28Jul 9, 2024Updated last year
- fuzz code from openssl updated to target libressl☆17Mar 5, 2024Updated 2 years ago
- An intercepting proxy, based on Netty☆19Sep 14, 2017Updated 8 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110May 12, 2016Updated 9 years ago
- Boyer-Moore search algorithm in Go☆15Apr 6, 2022Updated 4 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆35Feb 10, 2023Updated 3 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 6 years ago
- Code for our 2023 IEEE S&P Paper "The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web"☆14Dec 12, 2024Updated last year
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- ☆14Nov 16, 2024Updated last year
- ☆34Aug 13, 2021Updated 4 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- Simple process integrity checker Linux kernel module☆15Dec 3, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A collection of js analysis tools & scripts.☆19Mar 8, 2026Updated last month
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- ☆16Jan 3, 2018Updated 8 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- ☆153Jun 24, 2019Updated 6 years ago
- A simple docker file for apache 2.4 and php-fpm 7.0☆13Dec 20, 2017Updated 8 years ago
- Java反序列化漏洞学习笔记☆16Nov 17, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Plugin for Frida in Binary Ninja☆27May 19, 2021Updated 4 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- Trusted Computing Software Stack open source implementation☆27May 17, 2012Updated 13 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆104Aug 22, 2019Updated 6 years ago
- Exploit code developed/reproduced by me☆89Jan 25, 2023Updated 3 years ago
- Personal notes for Java Deserialization Vulnerability. 对应Java反序列化漏洞利用链集合详解、个人笔记☆18Jan 10, 2022Updated 4 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆65Oct 25, 2016Updated 9 years ago