A PoC for a malicious Confluence plugin.
☆16Aug 15, 2024Updated last year
Alternatives and similar repositories for malfluence
Users that are interested in malfluence are comparing it to the libraries listed below
Sorting:
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- ☆11Feb 28, 2022Updated 4 years ago
- ☆32Feb 3, 2026Updated last month
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Exploit for the CVE-2024-5806☆45Jun 24, 2024Updated last year
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ☆17Feb 3, 2026Updated last month
- Bring Your Own FIDO2 Extensions!☆16May 13, 2025Updated 9 months ago
- Minimal, customisable & powerful antivirus project☆10Mar 11, 2019Updated 6 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Contains instance scan checks to validate source code.☆15Feb 6, 2026Updated 3 weeks ago
- Shows how IRIS can ingest thousands or millions of records per second while allowing for queries on the same cluster. Works on a single I…☆13Jun 12, 2023Updated 2 years ago
- ☆11Aug 21, 2019Updated 6 years ago
- Latest llama.cpp in a containerized server + langchain support☆13Jul 2, 2023Updated 2 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 8 months ago
- Project to decentralize _why's code projects.☆26Jan 30, 2010Updated 16 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- ☆11Sep 1, 2022Updated 3 years ago
- A little experiment in unit test-based object discovery☆20Oct 14, 2016Updated 9 years ago
- an experimental implementation of Burrow's delta in Python 3☆12Jun 6, 2017Updated 8 years ago
- ☆12Dec 2, 2022Updated 3 years ago
- Update an ECS service to use a new Docker image☆13Feb 21, 2026Updated last week
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- Code and instructions for deploying a smaller open-source Language Large Model (LLM) on AWS Lambda, using Python, Docker.☆10Jun 13, 2024Updated last year
- Impacket with --remove-mic-partial☆28Jan 8, 2026Updated last month
- Provides a method unix_time which returns elapsed time since UNIX EPOCH. The returned time can be faked in each thread separately.☆12May 19, 2021Updated 4 years ago
- PersonaAI is a versatile tool designed to perform psychological profiling based on a person's Facebook ID.☆13Aug 21, 2024Updated last year
- BPP hunting☆10Nov 10, 2024Updated last year
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Arduino controlled laboratory power supply☆15Mar 26, 2014Updated 11 years ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Nix flake for build Pico HSM/OpenPGP/Fido firmware☆11Nov 5, 2025Updated 3 months ago
- ☆13Mar 23, 2023Updated 2 years ago
- A shortlist of core ServiceNow tables.☆15Oct 16, 2023Updated 2 years ago
- My dotfiles for Linux boxes☆57Feb 20, 2026Updated last week
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year