berylliumsec / eclipse
AI Powered Sensitive Information Detection
☆18Updated last year
Alternatives and similar repositories for eclipse:
Users that are interested in eclipse are comparing it to the libraries listed below
- ☆12Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆21Updated 7 months ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- Penetration Testing & Red Team tools & scripts☆12Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 2 months ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Manage attack surface data on Elasticsearch☆22Updated last year
- My talks...☆22Updated 3 weeks ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆15Updated 9 months ago
- Lexmark CVE-2023-26067☆23Updated last year
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- Demo of various ways to exploit post based reflected XSS☆18Updated last year
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆64Updated last year
- Simple WebSocket fuzzer☆32Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 11 months ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated last year
- PoC repository for CVE-2023-29007☆32Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆21Updated 7 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆43Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 10 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆17Updated last year
- ☆25Updated this week
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Updated last year
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year