byt3hx / researchView external linksLinks
The purpose of this repo is to share my research
☆14Apr 7, 2025Updated 10 months ago
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below
Sorting:
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆14Jan 23, 2023Updated 3 years ago
- ☆14Feb 7, 2024Updated 2 years ago
- POC for leaking java version through file and ftp protocols☆24Nov 1, 2020Updated 5 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- ☆36Jan 8, 2026Updated last month
- Archive - Repository contains old publicly released presentations, tools, Proof of Concepts and other junk.☆26Mar 9, 2025Updated 11 months ago
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆25Jul 23, 2021Updated 4 years ago
- ☆28Nov 4, 2020Updated 5 years ago
- I will share my bug bounty tips here☆32Mar 6, 2023Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆143Jun 27, 2023Updated 2 years ago
- ☆25Jan 19, 2026Updated 3 weeks ago
- ☆10Jun 16, 2021Updated 4 years ago
- ☆10Jan 26, 2026Updated 2 weeks ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Aug 22, 2024Updated last year
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- 四万多条规则,不含广告过滤,避免误杀,内含PAYPAL,TIKTOK,TELEGRAM,YOUTUBE,STREAMING (包含迪士尼奈飞亚马逊等流媒体),WEIBO分组规则,需要自己手动在小火箭里面-全局路由-分组-添加分组,需要以上哪个分组添加哪个,没添加的默认走PR…☆13Feb 4, 2023Updated 3 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated 3 weeks ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具,可根据不同的Jdk生成出其所对应的xslt文件☆93Jan 17, 2023Updated 3 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Oct 18, 2022Updated 3 years ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- ☆12Feb 1, 2022Updated 4 years ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 9 months ago
- ☆12Sep 6, 2020Updated 5 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- ☆10Mar 24, 2023Updated 2 years ago
- CVE-2025-68428 Proof of Concept☆24Jan 8, 2026Updated last month
- ☆11Aug 7, 2021Updated 4 years ago
- ☆12Dec 15, 2024Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Just an automation script to delete/unsend fb messages. Inspired from: @pishangujeniya/instagram-helper☆10Jul 31, 2022Updated 3 years ago
- Plugin for ExileAPI☆10Apr 9, 2023Updated 2 years ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- ExplorerPy is a scanning-toolkit . It can perform subdomain enumeration, directory brute-forcing, and port scanning.☆10Jan 30, 2024Updated 2 years ago