Default Linux files/images location
☆28Jan 12, 2021Updated 5 years ago
Alternatives and similar repositories for Linux-default-files-images-location
Users that are interested in Linux-default-files-images-location are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- NodeJS File Write to RCE on a read-only filesystem using a ROP chain in libuv☆38Oct 13, 2024Updated last year
- Test the speed and reliability of a list of DNS servers☆22Dec 9, 2020Updated 5 years ago
- Web Server that serves a single file and keeps the connection open until user releases it.☆75Nov 27, 2013Updated 12 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- An extension to mitmproxy to dump all proxied web traffic to elasticsearch where you can keep it forever (or until you run out of disk sp…☆26Apr 15, 2025Updated last year
- All-in-one AWS S3 bucket tool for pentesters.☆73Feb 16, 2019Updated 7 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- Session Hijacking Visual Exploitation☆212Mar 7, 2024Updated 2 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- EvenBetterExtensions allows you to quicky install and keep updated Caido extensions.☆22Sep 26, 2024Updated last year
- Hackmelock Android application☆17Apr 11, 2017Updated 9 years ago
- Burp Suite extension to discover assets from HTTP response.☆18May 18, 2021Updated 4 years ago
- PoC of CVE-2022-22978 vulnerability in Spring Security framework☆12Jun 4, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- OWASP Ukraine 2019 CTF☆12Feb 10, 2023Updated 3 years ago
- Rust-based high performance domain permutation generator.☆299Dec 2, 2023Updated 2 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆19Nov 29, 2024Updated last year
- A python based minimal DNS server to test/verify DNS rebinding attacks☆75May 15, 2023Updated 2 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆16Jul 11, 2025Updated 9 months ago
- Automated GitHub secret scanning with smart alerting & monitoring.☆31Jan 15, 2026Updated 3 months ago
- Bash scripts to automatically install, setup and update ModSecurity WAF with NGINX.☆14Apr 1, 2020Updated 6 years ago
- A tool to extract all the urls and paths found in the content of a page (js sources included)☆22Aug 8, 2025Updated 8 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Feb 4, 2022Updated 4 years ago
- Generating payloads to reverse shell in different contexts of java.☆50Jul 7, 2022Updated 3 years ago
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆410Dec 24, 2022Updated 3 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Authentication / Authorization server example with Rust, Warp, Postgres☆11Nov 9, 2020Updated 5 years ago
- Extracts subdomains from a specified domain using https://recon.dev.☆16Sep 12, 2020Updated 5 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- List HackerOne private program assets☆155Jun 24, 2021Updated 4 years ago
- The request.bin of DNS request☆241Jun 26, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Talk "Homographs, a history" or "Homographs, Attack!"☆13Jul 13, 2018Updated 7 years ago
- PoC for leaking text nodes via CSS injection☆25Jul 27, 2024Updated last year
- A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through fo…☆20Nov 21, 2025Updated 4 months ago
- My CTF writeups☆17Dec 1, 2019Updated 6 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,040Jun 3, 2021Updated 4 years ago
- Security Policies and Procedures for @feross projects☆14Mar 26, 2019Updated 7 years ago