berylliumsec / eclipseLinks
AI Powered Sensitive Information Detection
☆19Updated last year
Alternatives and similar repositories for eclipse
Users that are interested in eclipse are comparing it to the libraries listed below
Sorting:
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- My talks...☆25Updated 7 months ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Updated 2 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆16Updated last year
- ☆13Updated last year
- PoC repository for CVE-2023-29007☆34Updated 2 years ago
- ☆40Updated 3 months ago
- ☆44Updated 2 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆51Updated last year
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- 2022 CTF public release☆23Updated 3 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- PoC☆12Updated 6 months ago
- ☆59Updated this week
- Manage attack surface data on Elasticsearch☆23Updated last year
- an Evil Java RMI Registry.☆52Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- ☆19Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆182Updated last year
- ☆27Updated 2 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated 2 weeks ago
- Penetration Testing & Red Team tools & scripts☆12Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 7 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- An extension to use Semgrep inside Burp Suite.☆89Updated 4 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year