ansemjo / truepolyglotLinks
Create polyglot files, which are valid PDF and ZIP simultaneously. See POC||GTFO 07. (forked from git.hackade.org)
☆73Updated 2 months ago
Alternatives and similar repositories for truepolyglot
Users that are interested in truepolyglot are comparing it to the libraries listed below
Sorting:
- The Cloud Blocker☆108Updated 10 months ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆84Updated 2 years ago
- ☆44Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆159Updated 7 months ago
- Still point in moving world.☆49Updated 3 years ago
- Machine-learn password mangling rules☆114Updated 2 years ago
- a deterministic finite automata ranker☆73Updated 3 years ago
- Posts about different topics☆39Updated 4 months ago
- A CLI tool which can be used to inject JavaScript into arbitrary Chrome origins via the Chrome DevTools Protocol☆45Updated 4 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆91Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆10Updated 3 years ago
- Damn Vulnerable CICS Application☆29Updated last year
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 4 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆139Updated 2 months ago
- Intro to Assembly Optimization stream repo☆28Updated 4 years ago
- singe's grep - a fast grep using single-file parallelism☆47Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Creates and sends fake meeting invite☆74Updated 4 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆15Updated 5 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Updated 2 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆136Updated last year
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago