A CSRF demonstration of stealing local Redis data, and encrypting all Redis instances on a local network
☆53Feb 26, 2017Updated 9 years ago
Alternatives and similar repositories for whatsinmyredis
Users that are interested in whatsinmyredis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Abusing Self-XSS and Clickjacking to trigger XSS☆136Mar 18, 2017Updated 9 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- PS4 Linux Loader {5.0x}. Originally Developed By Valentinbreiz☆11May 16, 2018Updated 7 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 9 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Feb 28, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated 2 months ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- A wireless mesh based Command and Control infrastructure for locating mobile rogue access points☆16Jan 18, 2021Updated 5 years ago
- Script to scan OpenSSH host key and known_hosts files for shared keys from server hoster Hetzner☆19Jan 1, 2016Updated 10 years ago
- Command and Control server on Slack☆29Jan 30, 2019Updated 7 years ago
- ☆25Jul 30, 2017Updated 8 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 4 years ago
- ☆38Dec 17, 2012Updated 13 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- a toolset for autogenerating rust APIs and translating structs☆25May 30, 2018Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆116Mar 29, 2019Updated 7 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆230Apr 16, 2022Updated 3 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Webapplication Honeypot☆16May 12, 2013Updated 12 years ago
- Scans packages in npm and pypi for secrets☆31Nov 4, 2019Updated 6 years ago
- This firewall allows only communications made from allowed processes.☆13Aug 10, 2016Updated 9 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Secure approach to secure file storage in untrusted environments.☆35Mar 26, 2019Updated 7 years ago
- ☆12May 9, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- Ideas for a new implementation of cjdns☆21Feb 4, 2015Updated 11 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆62Jan 24, 2019Updated 7 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago