Shellshock exploit aka CVE-2014-6271
☆15Apr 1, 2022Updated 3 years ago
Alternatives and similar repositories for CVE-2014-6271
Users that are interested in CVE-2014-6271 are comparing it to the libraries listed below
Sorting:
- A lockout aware password sprayer☆15Jan 6, 2022Updated 4 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- birthday wish to hack font camera☆14Oct 18, 2025Updated 4 months ago
- A Android program help you learn English.☆13Mar 18, 2024Updated last year
- This python script can help you to detect what object is in moving.☆12Nov 28, 2018Updated 7 years ago
- autoscan - automatic fingerprint of visited networks☆11Nov 2, 2013Updated 12 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 4 years ago
- ☆11Mar 2, 2019Updated 7 years ago
- In photographic media, faces are often obfuscated to protect the identity of those pictured. This obfuscation process is done by removing…☆12Jan 10, 2019Updated 7 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Utility scripts for working with Fortigate FortiOS configuration files offline or via the API.☆15Oct 27, 2022Updated 3 years ago
- Extract links from any file or the website.☆11Nov 30, 2024Updated last year
- Python end-to-end pipeline to swap faces in videos and images☆13Dec 2, 2020Updated 5 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- A module for normalising text.☆10Nov 6, 2019Updated 6 years ago
- a tools to convert audio to a image like http://weavesilk.com/ display☆14Jan 24, 2015Updated 11 years ago
- Get a free local port or check if a port somewhere is reachable☆17Aug 3, 2025Updated 7 months ago
- ☆14Sep 20, 2014Updated 11 years ago
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- Native JACK support for Qubes OS (experimental)☆10Jul 22, 2017Updated 8 years ago
- @ArchieMeng's prototype of a Python FFI of nihui/waifu2x-ncnn-vulkan achieved with SWIG☆12Jul 20, 2022Updated 3 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 5 years ago
- Python script for SAP secure storage decrypton☆13Mar 14, 2018Updated 7 years ago
- This project will scrape all of repos on github according to the keywords.☆13Apr 3, 2019Updated 6 years ago
- A simple Android app to force your phone to allow it to act as a mobile hotspot.☆13Jul 19, 2016Updated 9 years ago
- ☆14Mar 20, 2025Updated 11 months ago
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago
- Exploit for CVE-2022-27226☆15Mar 19, 2022Updated 3 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16May 27, 2019Updated 6 years ago
- Candlestick Charts in JavaScript.☆15May 24, 2017Updated 8 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- Modern 3D game engine created with OpenGL, GLFW, C++, Entt, Lua, Sol2, Assimp, Emscripten, and Qt 5☆16Sep 8, 2022Updated 3 years ago