Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro
☆77Apr 15, 2025Updated 10 months ago
Alternatives and similar repositories for pop_n_bubble
Users that are interested in pop_n_bubble are comparing it to the libraries listed below
Sorting:
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data☆19May 9, 2025Updated 10 months ago
- Spamming All forone Powerfull Termux Tools☆31Dec 13, 2025Updated 2 months ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆27Apr 10, 2025Updated 10 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆38Feb 16, 2026Updated 3 weeks ago
- Detecting leaked secrets, API keys, credentials, and sensitive files from public repositories in near real-time using the GitHub Events A…☆31May 1, 2025Updated 10 months ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Dec 7, 2024Updated last year
- A python script that look for hikvision vulnerable cams with a backdoor☆28Nov 23, 2023Updated 2 years ago
- A new hobby operating system made with velocity in mind :D☆23Feb 12, 2025Updated last year
- Generate the default VGA 256-color palette.☆33Oct 5, 2017Updated 8 years ago
- A terminal UI to monitor and query Elasticsearch.☆12May 10, 2024Updated last year
- Exposing CharmingKitten's malicious activity for IRGC-IO Counterintelligence division (1500)☆429Oct 27, 2025Updated 4 months ago
- ☆17Jun 15, 2025Updated 8 months ago
- A Mersenne Twister Random Number Generator☆28Feb 2, 2024Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Sep 18, 2024Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Updated version of pywallet - a Bitcoin wallet importer/exporter☆17Jul 10, 2025Updated 7 months ago
- Arduino keyboard languages for easy swapping of keyboard layout codes to match your language, ideal for non US users☆10Apr 5, 2024Updated last year
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- aarch64 Malware course☆11Nov 13, 2025Updated 3 months ago
- An application built to monitor CS:GO prices on the Steam market☆13Dec 29, 2021Updated 4 years ago
- A powerful proxy checker that checks and evaluates proxies for speed, availability, and anonymity across multiple protocols (HTTP, HTTPS,…☆12Oct 31, 2025Updated 4 months ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Yet another credential store 🔐☆16May 8, 2025Updated 10 months ago
- ProxyChecker Made in NodeJS☆37Mar 15, 2022Updated 3 years ago
- JavaScript compiler for Scratch projects.☆11Sep 24, 2017Updated 8 years ago
- ☆11Aug 11, 2022Updated 3 years ago
- A large collection of blogs 🦐☆13Apr 12, 2025Updated 10 months ago
- C++ API for Buttplug IO☆12Aug 8, 2025Updated 7 months ago
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 2 months ago
- ☆20Feb 28, 2026Updated last week
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 11 months ago
- Attacking the cleanup_module function of a kernel module☆56Jun 30, 2025Updated 8 months ago
- ☆12Jun 24, 2023Updated 2 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- Decompilation research of Banjo-Kazooie for the xbox 360☆17Updated this week
- Kapso agent skills for WhatsApp.☆42Mar 1, 2026Updated last week
- ACPI Shutdown Hack in 512 bytes of Assembly☆11Jun 20, 2021Updated 4 years ago