ansemjo / truepolyglotLinks
Create polyglot files, which are valid PDF and ZIP simultaneously. See POC||GTFO 07. (forked from git.hackade.org)
☆62Updated 3 years ago
Alternatives and similar repositories for truepolyglot
Users that are interested in truepolyglot are comparing it to the libraries listed below
Sorting:
- The Cloud Blocker☆106Updated 5 months ago
- Damn Vulnerable CICS Application☆25Updated last year
- ☆44Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- shell for nasm☆64Updated 5 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆78Updated last year
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- singe's grep - a fast grep using single-file parallelism☆47Updated 2 years ago
- Still point in moving world.☆51Updated 2 years ago
- stealth userland kit that doesn't use sys_clone/sys_execve call☆33Updated 3 months ago
- z/OS - all things security☆85Updated 5 years ago
- Base64 Mutator☆13Updated 4 years ago
- A CLI tool which can be used to inject JavaScript into arbitrary Chrome origins via the Chrome DevTools Protocol☆44Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆14Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- DNS File EXfiltration☆46Updated last year
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- ☆27Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- ☆65Updated 3 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- Posts about different topics☆36Updated last year