demon-i386 / pop_n_bubbleView external linksLinks
Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro
☆77Apr 15, 2025Updated 10 months ago
Alternatives and similar repositories for pop_n_bubble
Users that are interested in pop_n_bubble are comparing it to the libraries listed below
Sorting:
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆14Jan 7, 2026Updated last month
- Deliver an extensive "fuck you" to whoever is trying to get into your server.☆16Apr 12, 2022Updated 3 years ago
- Spamming All forone Powerfull Termux Tools☆30Dec 13, 2025Updated 2 months ago
- (l)user friendly WinDBG theme.☆19Mar 16, 2019Updated 6 years ago
- One-time pad encryption command line tool - OT7.☆19Jul 9, 2016Updated 9 years ago
- Detecting leaked secrets, API keys, credentials, and sensitive files from public repositories in near real-time using the GitHub Events A…☆31May 1, 2025Updated 9 months ago
- A python script that look for hikvision vulnerable cams with a backdoor☆28Nov 23, 2023Updated 2 years ago
- A new hobby operating system made with velocity in mind :D☆23Feb 12, 2025Updated last year
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- Different methods to get current username without using whoami☆185Feb 12, 2024Updated 2 years ago
- Exposing CharmingKitten's malicious activity for IRGC-IO Counterintelligence division (1500)☆426Oct 27, 2025Updated 3 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆30Sep 18, 2024Updated last year
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- A powerful, easy to use and intuitive way to create network analysis charts☆15Updated this week
- QMK firmware for the ClockworkPi uConsole☆27Feb 8, 2026Updated last week
- This toolkit guides you on implementing secure and user-friendly digital and in-person interactions. Whether you are a service owner, dev…☆10Nov 6, 2025Updated 3 months ago
- Arduino keyboard languages for easy swapping of keyboard layout codes to match your language, ideal for non US users☆10Apr 5, 2024Updated last year
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- aarch64 Malware course☆11Nov 13, 2025Updated 3 months ago
- Tools for checking NIK☆17May 16, 2024Updated last year
- ☆11Nov 18, 2020Updated 5 years ago
- JavaScript compiler for Scratch projects.☆11Sep 24, 2017Updated 8 years ago
- C++ API for Buttplug IO☆12Aug 8, 2025Updated 6 months ago
- ProxyChecker Made in NodeJS☆37Mar 15, 2022Updated 3 years ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- A tool used to do reverse video searches.☆10Nov 30, 2024Updated last year
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 2 months ago
- A powerful proxy checker that checks and evaluates proxies for speed, availability, and anonymity across multiple protocols (HTTP, HTTPS,…☆12Oct 31, 2025Updated 3 months ago
- A collection of algorithms to reverse using partial information various hashes used by Minecraft to seed its ChunkRandom PRNG.☆10Mar 7, 2024Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 10 months ago
- Attacking the cleanup_module function of a kernel module☆57Jun 30, 2025Updated 7 months ago
- ☆195Apr 23, 2025Updated 9 months ago
- Matkap - hunt down malicious Telegram bots☆904Aug 11, 2025Updated 6 months ago
- Terraform Azure RM Compute Group Module☆10May 28, 2025Updated 8 months ago
- A docker container with different testing tools.☆13Jan 31, 2024Updated 2 years ago
- ☆19Dec 4, 2025Updated 2 months ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago