Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro
☆80Apr 15, 2025Updated last year
Alternatives and similar repositories for pop_n_bubble
Users that are interested in pop_n_bubble are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 「🧊」Ring 3 Rootkit for Windows 10☆63Dec 7, 2024Updated last year
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆16Jan 7, 2026Updated 4 months ago
- A large collection of blogs 🦐☆13Apr 12, 2025Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆45Dec 7, 2024Updated last year
- Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data☆20May 9, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆13Jun 3, 2025Updated 11 months ago
- Different methods to get current username without using whoami☆186Feb 12, 2024Updated 2 years ago
- (l)user friendly WinDBG theme.☆22Mar 16, 2019Updated 7 years ago
- Deliver an extensive "fuck you" to whoever is trying to get into your server.☆17Apr 12, 2022Updated 4 years ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- A tool to test cross-device authentication protocol security☆27Feb 24, 2025Updated last year
- ☆12Sep 10, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 「🔎」CORS vulnerability scanner☆12Dec 7, 2024Updated last year
- HTTP reverse proxy to access files hosted on a FTP server☆12Dec 3, 2025Updated 5 months ago
- 「📖」Tool created to extract metadata from a domain☆14Dec 7, 2024Updated last year
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated 2 months ago
- 「🧹」Clear logs after an invasion☆18Dec 7, 2024Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- ☆17May 21, 2022Updated 4 years ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆53May 5, 2025Updated last year
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories☆11Sep 26, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆31Sep 18, 2024Updated last year
- Wired Voices is an anonymous real-time ephemeral textboard inspired by the now-defunct imageboard mebious.co.uk and Serial Experiments La…☆14Oct 9, 2023Updated 2 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆18Dec 7, 2024Updated last year
- Proof of concept & details for CVE-2025-21298☆198Jan 20, 2025Updated last year
- 「🔑」Discord Brute Force Token☆10Mar 15, 2021Updated 5 years ago
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Optimal Static Parametric Estimation of Arbitrary Distributions (OSPEAD) for the Monero decoy selection algorithm☆51Apr 21, 2025Updated last year
- WordPress Genesis Child Theme setup to use kristopolous's BOOTSTRA.386☆15Jul 15, 2018Updated 7 years ago
- Reverse engineering project on stream☆13Mar 19, 2021Updated 5 years ago
- Decompilation research of Banjo-Kazooie for the xbox 360☆19Mar 7, 2026Updated 2 months ago
- ☆16Jan 9, 2025Updated last year
- ☆19Aug 4, 2022Updated 3 years ago
- This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).☆248Mar 26, 2025Updated last year