Symbolic execution inspired PHP application scanner for code-path discovery
☆34May 2, 2019Updated 6 years ago
Alternatives and similar repositories for phpscan
Users that are interested in phpscan are comparing it to the libraries listed below
Sorting:
- ☆23Apr 6, 2019Updated 6 years ago
- Fetching data from system☆12Jun 18, 2017Updated 8 years ago
- FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities☆98Nov 27, 2023Updated 2 years ago
- Our team's CTF writeups☆12Jan 15, 2020Updated 6 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- procfs-based PHP sandbox bypass☆133Sep 19, 2018Updated 7 years ago
- An authentication handler for using CredSSP with Python Requests.☆24May 31, 2023Updated 2 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- ☆13Mar 19, 2022Updated 3 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- ☆11Oct 19, 2018Updated 7 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 8 months ago
- ☆11Nov 25, 2020Updated 5 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- A Control Flow Graph implementation in PHP☆247Sep 20, 2025Updated 5 months ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- Bytecode based Fuzzer for the PHP language☆12Jul 22, 2020Updated 5 years ago
- Implementation of Taint Tracking in LLVM compiler.☆10Jan 1, 2013Updated 13 years ago
- It checks how secure the program you made is and shows how vulnerable your program is.☆20Apr 20, 2017Updated 8 years ago
- ☆13May 9, 2017Updated 8 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Ghidracraft is part of the bincraft project collections, a forked version of Ghidra which mixes in our flavor. Checkout ghidracraft-book …☆88Oct 22, 2021Updated 4 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆20Oct 21, 2012Updated 13 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- Programming oriented AWD framework☆16Feb 11, 2020Updated 6 years ago
- Scripts for ElasticSearch vulns☆13Oct 17, 2015Updated 10 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- Collection of vulnerable and fixed PHP synthetic test cases☆66Oct 15, 2023Updated 2 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- Offensive go lang series☆35May 2, 2020Updated 5 years ago
- ☆24Nov 17, 2025Updated 3 months ago
- Cookbook for mod_security deployment☆25Oct 6, 2022Updated 3 years ago