dogancanbakir / pirebokLinks
pîrebok (from Kurdish "witch") - a guided adversarial fuzzer
☆15Updated 2 years ago
Alternatives and similar repositories for pirebok
Users that are interested in pirebok are comparing it to the libraries listed below
Sorting:
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32Updated 3 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 5 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- μετάμάσκα - malevolent payload classifier☆24Updated 2 years ago
- Exactly what it sounds like, which is something rad☆23Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- ☆21Updated 3 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆42Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- Simple S3 Bucket Testing Software☆31Updated 4 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Updated 5 years ago
- Tricard - Malware Sandbox Fingerprinting☆22Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- ☆26Updated 3 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last week
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- ☆12Updated 2 years ago
- ☆18Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago