Redis Security Map - Anti-hacking for Redis
☆31Mar 11, 2022Updated 4 years ago
Alternatives and similar repositories for rsm
Users that are interested in rsm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Jun 26, 2017Updated 8 years ago
- Slack C2bot that executes commands and returns the output.☆49Mar 13, 2023Updated 3 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 6 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 9 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- A BurpSuite plugin for BBRF☆26Nov 17, 2024Updated last year
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- ☆30Jul 29, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- TAODOS stands for The Art of Denial-of-Service☆16Jul 2, 2021Updated 4 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆58Oct 25, 2019Updated 6 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- gorobots - robots.txt recon & path discovery in Go. Structured parsing, 29-category sensitivity classification, concurrent path probing, …☆16Apr 10, 2026Updated 2 weeks ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45May 29, 2019Updated 6 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Passive Network Audit Framework☆32May 17, 2018Updated 7 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- generate reverse shell from CLI for linux and Windows.☆248Sep 17, 2020Updated 5 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆37Aug 13, 2018Updated 7 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Horizontal Domain Discovery☆76May 22, 2023Updated 2 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆55Jan 18, 2020Updated 6 years ago
- Backdoor detection for VMware view☆13Jan 5, 2022Updated 4 years ago
- ☆11Feb 14, 2025Updated last year
- A debugger / emulator for Ghidra☆14Oct 30, 2019Updated 6 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆25Mar 1, 2019Updated 7 years ago