A CSRF demonstration of stealing local Redis data, and encrypting all Redis instances on a local network
☆53Feb 26, 2017Updated 9 years ago
Alternatives and similar repositories for whatsinmyredis
Users that are interested in whatsinmyredis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆136Mar 18, 2017Updated 9 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A wireless mesh based Command and Control infrastructure for locating mobile rogue access points☆16Jan 18, 2021Updated 5 years ago
- Script to scan OpenSSH host key and known_hosts files for shared keys from server hoster Hetzner☆19Jan 1, 2016Updated 10 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- ☆25Jul 30, 2017Updated 8 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ☆38Dec 17, 2012Updated 13 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- a federated social network☆15Apr 8, 2018Updated 7 years ago
- Some of the presentations given by me☆19Aug 8, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆116Mar 29, 2019Updated 6 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆229Apr 16, 2022Updated 3 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- A janky framework for building Signal bots.☆15Nov 24, 2020Updated 5 years ago
- Webapplication Honeypot☆15May 12, 2013Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This firewall allows only communications made from allowed processes.☆13Aug 10, 2016Updated 9 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- a bot for the ipfs irc channel that pins things (among other menial tasks)☆24May 2, 2018Updated 7 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Secure approach to secure file storage in untrusted environments.☆35Mar 26, 2019Updated 7 years ago
- ☆12May 9, 2017Updated 8 years ago
- List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built in…☆131Oct 2, 2020Updated 5 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- A websocket proxy☆13Nov 13, 2017Updated 8 years ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- ☆20Jun 2, 2016Updated 9 years ago