Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.
☆33Mar 13, 2018Updated 8 years ago
Alternatives and similar repositories for randomstringutils
Users that are interested in randomstringutils are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 11 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 14 years ago
- fuzz code from openssl updated to target libressl☆17Mar 5, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An intercepting proxy, based on Netty☆19Sep 14, 2017Updated 8 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆109May 12, 2016Updated 10 years ago
- Boyer-Moore search algorithm in Go☆15Apr 6, 2022Updated 4 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- ☆35Feb 10, 2023Updated 3 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 6 years ago
- ☆16Feb 24, 2019Updated 7 years ago
- libsodium for Universal Windows Platform (UWP) - A secure cryptographic library☆16Jun 24, 2018Updated 7 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- ☆14Nov 16, 2024Updated last year
- ☆34Aug 13, 2021Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- A collection of js analysis tools & scripts.☆19May 4, 2026Updated 2 weeks ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- ☆16Jan 3, 2018Updated 8 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- ☆153Jun 24, 2019Updated 6 years ago
- A simple docker file for apache 2.4 and php-fpm 7.0☆13Dec 20, 2017Updated 8 years ago
- Java反序列化漏洞学习笔记☆16Nov 17, 2019Updated 6 years ago
- Plugin for Frida in Binary Ninja☆27May 19, 2021Updated 5 years ago
- ☆14Apr 23, 2019Updated 7 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆104Aug 22, 2019Updated 6 years ago
- Exploit code developed/reproduced by me☆89Jan 25, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆65Oct 25, 2016Updated 9 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 11 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆143Jul 9, 2024Updated last year
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago