☆88Apr 17, 2017Updated 9 years ago
Alternatives and similar repositories for cursory-hack
Users that are interested in cursory-hack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Java serializer in JavaScript☆81May 21, 2018Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- no-bullshit url shortening with node.js☆10Jan 11, 2023Updated 3 years ago
- Talk "Homographs, a history" or "Homographs, Attack!"☆13Jul 13, 2018Updated 7 years ago
- A collection of browser-based side channel attack vectors.☆759Mar 19, 2024Updated 2 years ago
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- SecurityPaper For www.polaris-lab.com☆104Mar 13, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- 📝Simple text editor☆13Dec 10, 2022Updated 3 years ago
- Web&Browser Security☆43Sep 27, 2022Updated 3 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- Pure CSS indentation lines for Hacker News with two-second installation via uBlock Origin☆11Jan 31, 2021Updated 5 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- A way to share your Keybase profile online easily through an image implemented through PHP.☆10Feb 12, 2019Updated 7 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- CVE-2017-13089☆56Nov 15, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- 攻击Java Web应用-[Java Web安全]☆15Dec 9, 2020Updated 5 years ago
- may the poc with you☆17May 6, 2022Updated 3 years ago
- PopLeopardCat☆12Aug 23, 2021Updated 4 years ago
- ☆100Nov 5, 2021Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Sep 19, 2016Updated 9 years ago
- ☆119Mar 21, 2020Updated 6 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- TLS Redirection☆118Nov 21, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆11Aug 2, 2017Updated 8 years ago
- Burp Suite extension for JAX-RS☆64Mar 17, 2017Updated 9 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- ☆14Mar 19, 2026Updated last month
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago