☆107Mar 18, 2026Updated 2 months ago
Alternatives and similar repositories for hyoketsu
Users that are interested in hyoketsu are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- New exploitation tricks for hardened .NET Remoting servers☆32Aug 5, 2025Updated 9 months ago
- ☆31Sep 9, 2025Updated 8 months ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- SARIF Explorer: A VSCode extension that helps you visualize and triage static analysis results☆50May 9, 2026Updated last week
- Resources to learn about Insecure Deserialization☆18Jul 12, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Final and fully functional Car pooling app with database hosted on hostinger.in☆12Dec 7, 2017Updated 8 years ago
- Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)☆19Aug 23, 2024Updated last year
- Analyze secretsdump output and hashcat potfiles to find shared passwords and weak credentials in Active Directory☆37Apr 4, 2026Updated last month
- ReCopilot IDA☆55Jan 12, 2026Updated 4 months ago
- Online Auction is a online platform for auction and this project is made using PHP 5, MySQL, Javascript, JQuery, Bootstrap and HTML☆16Sep 25, 2016Updated 9 years ago
- NodeJS File Write to RCE on a read-only filesystem using a ROP chain in libuv☆38Oct 13, 2024Updated last year
- Example Vulnerable .NET HTTP Remoting☆88Mar 26, 2019Updated 7 years ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- Command generator for pentesting tools☆16Dec 2, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An Android carpooling app☆15Mar 13, 2019Updated 7 years ago
- 一款基于James Forshaw的.NET Remoting反序列化工具升级版在TypeFilterLevel.Low模式无文件payload任意代码执行poc的开发心得☆48Jan 23, 2025Updated last year
- ☆38Dec 10, 2024Updated last year
- Public repository of 2026 crackmes.one CTF RE challenge☆42Mar 10, 2026Updated 2 months ago
- List of Mine Private wordlist i use for fuzzing☆93Feb 25, 2026Updated 2 months ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- IrisCTF 2023 challenges.☆16Jan 23, 2023Updated 3 years ago
- A tool to decrypt all Synology encrypted archives (SPK, PAT, ...)☆21Jun 6, 2025Updated 11 months ago
- 用Go+Fyne开发的,展示JAVA序列化流以及集成一键插入脏数据,UTF过长编码绕WAF(Utf OverLoad Encoding),修改类SerializeVersionUID功能的图形化工具。☆126Jan 14, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 8 months ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆43Jan 31, 2026Updated 3 months ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- CVE-2024-53691☆15Jan 13, 2025Updated last year
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆34Nov 21, 2020Updated 5 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆154May 14, 2026Updated last week
- A lightweight caching proxy for package registries.☆69Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- PHP 8 Sandbox Escape☆87Feb 28, 2026Updated 2 months ago
- ☆13Dec 22, 2020Updated 5 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆25Dec 28, 2025Updated 4 months ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- Challenge Python☆19Apr 26, 2023Updated 3 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆54Jan 28, 2026Updated 3 months ago
- ☆32Dec 28, 2023Updated 2 years ago