a Machine Learning powered CSRF attacks finding tool
☆27Mar 8, 2019Updated 7 years ago
Alternatives and similar repositories for mitch
Users that are interested in mitch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware Analysis (Zararlı Yazılım Analizi)☆33Aug 1, 2019Updated 6 years ago
- ☆11Jul 18, 2022Updated 3 years ago
- ☆11Jun 5, 2015Updated 10 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(python版本)☆13Jan 20, 2022Updated 4 years ago
- Continuous build system used by Mono and Moonlight.☆34Apr 8, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆19Feb 1, 2016Updated 10 years ago
- ☆25Aug 13, 2020Updated 5 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 6 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- finds hidden parameters☆23Aug 12, 2023Updated 2 years ago
- STMCTF17 Writeups☆36Nov 8, 2017Updated 8 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆13Dec 16, 2022Updated 3 years ago
- Open source code for MobiPurpose project☆13Mar 25, 2025Updated last year
- 淘宝秒杀脚本☆13Oct 23, 2024Updated last year
- 安卓逆向教程、技巧、工具、文档。☆16Mar 23, 2024Updated 2 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆36Oct 15, 2020Updated 5 years ago
- Our backup exploitation technique: fuzzing for POVs!☆25Aug 20, 2016Updated 9 years ago
- iOS Automation Framework iOS Touch Simulation Library☆14Nov 18, 2024Updated last year
- a crawler for apple AppStore☆19Nov 10, 2020Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆37Dec 20, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 实战攻击中的badusb脚本☆16Apr 6, 2020Updated 6 years ago
- ☆11Sep 7, 2023Updated 2 years ago
- Blockchain server, mining server and proof-of-work, python power☆13Dec 5, 2019Updated 6 years ago
- this repo contains required files for web application pentests☆194Dec 8, 2016Updated 9 years ago
- A xss target for practicing☆10Feb 22, 2017Updated 9 years ago
- eXpose deep neural network, detects malicious URLs, file paths and registry keys with proper training☆47Feb 13, 2018Updated 8 years ago
- generate yara-androguard report on your local and scan☆12Oct 3, 2019Updated 6 years ago
- experimental wildcard subdomain filtering prototype☆14Aug 5, 2023Updated 2 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆21May 6, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of awesome web crawler,spider in different languages☆12Oct 6, 2017Updated 8 years ago
- Ardupilot fork fordrone dance controller project by SPH Engineering☆15Sep 5, 2017Updated 8 years ago
- CVE-2021-40438 exploit PoC with Docker setup.☆12Oct 24, 2021Updated 4 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated 2 months ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆41Apr 13, 2022Updated 4 years ago