CodeIgniter <=2.1.4 session cookie decryption vulnerability
☆39Aug 12, 2016Updated 9 years ago
Alternatives and similar repositories for CodeIgniterXor
Users that are interested in CodeIgniterXor are comparing it to the libraries listed below
Sorting:
- Script to find exploitable magic methods for PHP object injection☆27Dec 4, 2014Updated 11 years ago
- (DOM-)XSS fuzzer based on phantomjs and go.☆34Dec 18, 2014Updated 11 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- ☆12Sep 18, 2016Updated 9 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- PHP extension for web-application dynamic analysis.☆27Sep 21, 2018Updated 7 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- ☆23Feb 4, 2026Updated 3 weeks ago
- Honeypot built to mimic an insecure GoAhead Wifi Camera☆18Apr 4, 2017Updated 8 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- Record some Vulnerabilities☆44Nov 19, 2022Updated 3 years ago
- Windows Event Forwarding for Active Directory Security Logs☆29Jun 28, 2016Updated 9 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- nmap默认的scripts和自己收集的一些scripts☆21Feb 22, 2018Updated 8 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Cython bindings for libpcap and libtins☆10Dec 19, 2016Updated 9 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆83Sep 27, 2018Updated 7 years ago
- SSRF Proxy facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.☆479Jan 1, 2018Updated 8 years ago
- WebShell密码爆破工具☆19Mar 23, 2017Updated 8 years ago
- ☆23Oct 11, 2019Updated 6 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- ☆11Nov 28, 2016Updated 9 years ago