☆88Apr 17, 2017Updated 8 years ago
Alternatives and similar repositories for cursory-hack
Users that are interested in cursory-hack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- 2018年度のbootcampのセキュリティ教材☆13Apr 27, 2018Updated 7 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ONdemand csS injEctioN tool☆43May 1, 2023Updated 2 years ago
- A Java serializer in JavaScript☆80May 21, 2018Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- weak password generation☆13Oct 16, 2015Updated 10 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- SecurityPaper For www.polaris-lab.com☆104Mar 13, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- Web&Browser Security☆43Sep 27, 2022Updated 3 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- WebAppSec Confinement Origin Web Labels☆11Feb 16, 2021Updated 5 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- 攻击Java Web应用-[Java Web安全]☆15Dec 9, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An nginx module to prevent generic compression oracles☆10Sep 25, 2024Updated last year
- may the poc with you☆17May 6, 2022Updated 3 years ago
- PopLeopardCat☆12Aug 23, 2021Updated 4 years ago
- ☆100Nov 5, 2021Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Sep 19, 2016Updated 9 years ago
- CVE-2018-3252-PoC☆74Dec 7, 2018Updated 7 years ago
- ☆119Mar 21, 2020Updated 6 years ago
- Unofficial website of security camp☆14Aug 19, 2025Updated 7 months ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆57Dec 6, 2016Updated 9 years ago
- [DEFUNCT - do not use, insecure!] Communication for the 21st century activist.☆16Aug 5, 2025Updated 8 months ago
- TLS Redirection☆118Nov 21, 2017Updated 8 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Burp Suite extension for JAX-RS☆65Mar 17, 2017Updated 9 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago