Ed is a tool used to identify and exploit accessible UNIX Domain Sockets
☆27Mar 11, 2019Updated 6 years ago
Alternatives and similar repositories for ed
Users that are interested in ed are comparing it to the libraries listed below
Sorting:
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Feb 10, 2026Updated 3 weeks ago
- ☆17Sep 10, 2021Updated 4 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Apr 1, 2021Updated 4 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Jan 31, 2019Updated 7 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆23Oct 29, 2020Updated 5 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- go reversing helpers for binaryninja☆32Feb 18, 2023Updated 3 years ago
- Android trojan server part written in PHP☆22Sep 11, 2016Updated 9 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- ☆29Jan 31, 2025Updated last year
- ☆29Feb 24, 2021Updated 5 years ago
- ☆42Nov 13, 2025Updated 3 months ago
- An Erlang library wrapping AES-GCM (AEAD) crypto in a Fernet-like interface☆29Jan 22, 2021Updated 5 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Oct 7, 2025Updated 4 months ago
- A shell script to do various checks on Go code.☆34Feb 13, 2018Updated 8 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Ruby gem to help prevent Server Side Request Forgery☆42Jun 18, 2024Updated last year
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- PowerAuth Web Authentication - Federated Authentication and Authorization Server for Web☆13Feb 23, 2026Updated last week
- IP kung-FU☆10Mar 14, 2019Updated 6 years ago
- Simple implementation of a p2p chat from web browsers☆12Dec 5, 2025Updated 3 months ago
- Go Package provides a generic data types similar to that of Ruby☆13Updated this week
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- A python client for the devtools protocol☆17Apr 7, 2025Updated 10 months ago
- Isometric Love design tool☆18Jan 23, 2019Updated 7 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago