Hackerone disclosed report URL Aggregator
☆30Oct 31, 2018Updated 7 years ago
Alternatives and similar repositories for Hackerone
Users that are interested in Hackerone are comparing it to the libraries listed below
Sorting:
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- ☆49Jan 11, 2019Updated 7 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Script to find exploitable magic methods for PHP object injection☆27Dec 4, 2014Updated 11 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 11 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- An Android port of the general purpose honggfuzz fuzzer☆19Aug 20, 2015Updated 10 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Android Testing☆16Mar 24, 2014Updated 11 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- Materials for OWASP presentation on malicious JavaScript☆16Aug 30, 2010Updated 15 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- ☆54Sep 10, 2016Updated 9 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆12May 14, 2016Updated 9 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- ☆13Jul 22, 2017Updated 8 years ago
- 自动化的渗透工具☆11Jul 8, 2013Updated 12 years ago
- Tainted PhantomJS☆52Jul 6, 2015Updated 10 years ago
- Collection of tools for web recon and enumeration.☆56Jun 3, 2015Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago