dxa4481 / whatsinmyredisView external linksLinks
A CSRF demonstration of stealing local Redis data, and encrypting all Redis instances on a local network
☆53Feb 26, 2017Updated 8 years ago
Alternatives and similar repositories for whatsinmyredis
Users that are interested in whatsinmyredis are comparing it to the libraries listed below
Sorting:
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆136Mar 18, 2017Updated 8 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Sep 28, 2015Updated 10 years ago
- ☆18Jan 31, 2025Updated last year
- ☆12May 9, 2017Updated 8 years ago
- Program for extracting TLS keys from Oculus Runtime☆53May 11, 2020Updated 5 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Feb 28, 2020Updated 5 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Uncover IPv6 address harvesting through firewall log analysis☆13Jan 29, 2016Updated 10 years ago
- [Windows] Local Privilege Escalation - WebClient☆59May 15, 2017Updated 8 years ago
- SD/MMC Analyzer for Saleae Logic☆39Mar 18, 2024Updated last year
- Authenticate against a MySQL server without knowing the cleartext password☆226Apr 16, 2022Updated 3 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- A wireless mesh based Command and Control infrastructure for locating mobile rogue access points☆16Jan 18, 2021Updated 5 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆189Sep 21, 2020Updated 5 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- Automate generation of syzkaller's grammar☆16Nov 1, 2022Updated 3 years ago