Redis Security Map - Anti-hacking for Redis
☆31Mar 11, 2022Updated 3 years ago
Alternatives and similar repositories for rsm
Users that are interested in rsm are comparing it to the libraries listed below
Sorting:
- ☆20Aug 18, 2020Updated 5 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- A BurpSuite plugin for BBRF☆25Nov 17, 2024Updated last year
- Slack C2bot that executes commands and returns the output.☆47Mar 13, 2023Updated 2 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Backdoor detection for VMware view☆13Jan 5, 2022Updated 4 years ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Scans npmjs.org for npm packages that can be taken over☆19Jun 6, 2022Updated 3 years ago
- TAODOS stands for The Art of Denial-of-Service☆16Jul 2, 2021Updated 4 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆35Mar 2, 2020Updated 5 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- A comprehensive curated list of available Blockchain Bug Bounty Programs.☆79Feb 22, 2019Updated 7 years ago
- This Repo help you to download most helpful GO tools on the system .☆22Dec 7, 2022Updated 3 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Oct 2, 2025Updated 4 months ago
- Slides of my public talks☆61Feb 20, 2026Updated last week
- ☆16Mar 4, 2019Updated 6 years ago