Ed is a tool used to identify and exploit accessible UNIX Domain Sockets
☆27Mar 11, 2019Updated 7 years ago
Alternatives and similar repositories for ed
Users that are interested in ed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Feb 10, 2026Updated last month
- A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418☆35Mar 21, 2019Updated 7 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Apr 1, 2021Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Jan 31, 2019Updated 7 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆23Oct 29, 2020Updated 5 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- Posts about different topics☆39Mar 13, 2026Updated last week
- Sarif exporter☆13Apr 23, 2024Updated last year
- OWASP Passfault evaluates passwords and enforces password policy in a completely different way.☆13Feb 10, 2017Updated 9 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆20Feb 9, 2024Updated 2 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- templates for our relays☆12Mar 26, 2018Updated 8 years ago
- ☆29Jan 31, 2025Updated last year
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Burp Suite plugin for binary search on HTTP parameters☆17Oct 31, 2017Updated 8 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Mar 12, 2026Updated 2 weeks ago
- Finding code caves in ELF files with GoLang☆27Jan 15, 2018Updated 8 years ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated 2 months ago
- ptunnel 0.72 for windows☆23Sep 19, 2014Updated 11 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Fast and simple JSON parser for Go☆21Jun 4, 2017Updated 8 years ago
- An Erlang library wrapping AES-GCM (AEAD) crypto in a Fernet-like interface☆29Jan 22, 2021Updated 5 years ago
- Python Web framework P0wner☆75Jan 27, 2013Updated 13 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆99Dec 1, 2017Updated 8 years ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- PowerAuth Web Authentication - Federated Authentication and Authorization Server for Web☆13Mar 16, 2026Updated last week