☆132Oct 29, 2023Updated 2 years ago
Alternatives and similar repositories for unwyze
Users that are interested in unwyze are comparing it to the libraries listed below
Sorting:
- ☆18Jan 21, 2026Updated last month
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Hacking cheap IP cameras for fun and ECTS!☆25Feb 9, 2021Updated 5 years ago
- ☆21Sep 25, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- ☆25Sep 27, 2023Updated 2 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 4 months ago
- ☆42Oct 10, 2025Updated 5 months ago
- ☆60Apr 21, 2023Updated 2 years ago
- PCAP-over-IP server written in Golang☆41Jun 2, 2025Updated 9 months ago
- exploit for cve-2023-47246 SysAid RCE (shell upload)☆53Dec 7, 2023Updated 2 years ago
- Python Command-Line Ghidra Binary Diffing Engine☆745Sep 25, 2025Updated 5 months ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆267Mar 1, 2024Updated 2 years ago
- ☆16Dec 28, 2016Updated 9 years ago
- ☆80Jul 26, 2022Updated 3 years ago
- ☆58Jan 29, 2024Updated 2 years ago
- CVE-2019-2525 / CVE-2019-2548☆11Sep 4, 2020Updated 5 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Aug 11, 2020Updated 5 years ago
- ☆73Feb 25, 2024Updated 2 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- Fork of Synacktiv's private Lumina server☆21Feb 22, 2022Updated 4 years ago
- A tool for firmware cartography☆165Dec 8, 2025Updated 3 months ago
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆15Apr 1, 2018Updated 7 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ☆74Apr 8, 2024Updated last year
- A tool to inject C code into ELF64 binaries☆29May 25, 2021Updated 4 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated last month
- ☆28Feb 6, 2024Updated 2 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Feb 3, 2026Updated last month
- Repository to store exploits created by Assetnotes Security Research team☆182Nov 7, 2023Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆156Oct 19, 2023Updated 2 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago