brompwnie / edLinks
Ed is a tool used to identify and exploit accessible UNIX Domain Sockets
☆27Updated 6 years ago
Alternatives and similar repositories for ed
Users that are interested in ed are comparing it to the libraries listed below
Sorting:
- An Evil OIDC Server☆53Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Updated 4 years ago
- Burp with Friends☆103Updated 2 years ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- Capture all RabbitMQ messages being sent through a broker.☆31Updated 4 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Updated 4 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 8 months ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Docker auditing and enumeration script.☆22Updated 5 years ago
- ☆57Updated 2 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 7 months ago
- ☆10Updated 7 months ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- ☆15Updated 2 years ago
- Basic tutorials for reverse engineer with radare2☆61Updated 6 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Helper scripts to assist penetration testing and exploit development☆37Updated 5 months ago
- ☆17Updated 4 years ago
- Vulnerabilities, exploits, and PoCs☆36Updated this week
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Provides access to libhashcat☆30Updated last year
- Scripts to extract files from SCM directories left on web servers☆36Updated last year