☆88Apr 17, 2017Updated 9 years ago
Alternatives and similar repositories for cursory-hack
Users that are interested in cursory-hack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- 2018年度のbootcampのセキュリティ教材☆13Apr 27, 2018Updated 8 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago
- Experimental Java agent to stomp on things.☆15Feb 10, 2019Updated 7 years ago
- A Java serializer in JavaScript☆81May 21, 2018Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- weak password generation☆13Oct 16, 2015Updated 10 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 9 years ago
- Talk "Homographs, a history" or "Homographs, Attack!"☆13Jul 13, 2018Updated 7 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- SecurityPaper For www.polaris-lab.com☆104Mar 13, 2019Updated 7 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- Web&Browser Security☆43Sep 27, 2022Updated 3 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- A powerful, standalone YouTube video & playlist downloader built with C# WPF. Features smart size calculation, auto-dark mode, and built-…☆77Apr 16, 2026Updated last month
- CVE-2017-13089☆56Nov 15, 2017Updated 8 years ago
- 攻击Java Web应用-[Java Web安全]☆15Dec 9, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- may the poc with you☆16May 6, 2022Updated 4 years ago
- PopLeopardCat☆12Aug 23, 2021Updated 4 years ago
- ☆100Nov 5, 2021Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Sep 19, 2016Updated 9 years ago
- CVE-2018-3252-PoC☆74Dec 7, 2018Updated 7 years ago
- ☆119Mar 21, 2020Updated 6 years ago
- Unofficial website of security camp☆14Aug 19, 2025Updated 9 months ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆57Dec 6, 2016Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆11Aug 2, 2017Updated 8 years ago
- Burp Suite extension for JAX-RS☆65Mar 17, 2017Updated 9 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- ☆14Mar 19, 2026Updated 2 months ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆21Jun 16, 2022Updated 3 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago