☆88Apr 17, 2017Updated 8 years ago
Alternatives and similar repositories for cursory-hack
Users that are interested in cursory-hack are comparing it to the libraries listed below
Sorting:
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- 2018年度のbootcampのセキュリティ教材☆13Apr 27, 2018Updated 7 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago
- ONdemand csS injEctioN tool☆43May 1, 2023Updated 2 years ago
- Experimental Java agent to stomp on things.☆15Feb 10, 2019Updated 7 years ago
- A Java serializer in JavaScript☆80May 21, 2018Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- Talk "Homographs, a history" or "Homographs, Attack!"☆13Jul 13, 2018Updated 7 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- A collection of browser-based side channel attack vectors.☆760Mar 19, 2024Updated 2 years ago
- SecurityPaper For www.polaris-lab.com☆104Mar 13, 2019Updated 7 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- A way to share your Keybase profile online easily through an image implemented through PHP.☆10Feb 12, 2019Updated 7 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- 攻击Java Web应用-[Java Web安全]☆15Dec 9, 2020Updated 5 years ago
- may the poc with you☆17May 6, 2022Updated 3 years ago
- This tool converts OVA (Open Virtual Appliance) or VMDK (Virtual Machine Disk) files to Docker container format.☆26Sep 23, 2025Updated 5 months ago
- PopLeopardCat☆12Aug 23, 2021Updated 4 years ago
- ☆100Nov 5, 2021Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Sep 19, 2016Updated 9 years ago
- CVE-2018-3252-PoC☆74Dec 7, 2018Updated 7 years ago
- ☆119Mar 21, 2020Updated 5 years ago
- Unofficial website of security camp☆14Aug 19, 2025Updated 7 months ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆57Dec 6, 2016Updated 9 years ago
- TLS Redirection☆118Nov 21, 2017Updated 8 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Burp Suite extension for JAX-RS☆65Mar 17, 2017Updated 9 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- ☆14Dec 8, 2021Updated 4 years ago