Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.
☆23Aug 28, 2013Updated 12 years ago
Alternatives and similar repositories for MalaRIA-Proxy
Users that are interested in MalaRIA-Proxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- QL Workshop☆16Sep 30, 2019Updated 6 years ago
- Abusing U2F to 'store' a stable secret☆15Nov 23, 2015Updated 10 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Meterpreter Scripts that I'm working on☆171Jan 28, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Setup Ghidra environment for GitHub Actions☆16Mar 16, 2026Updated last week
- An introductory tutorial for the Coq proof assistant.☆10Feb 5, 2019Updated 7 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- the userspace side of Linux' CONFIG_STATIC_USERMODEHELPER☆16Mar 22, 2024Updated 2 years ago
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 9 months ago
- Example for casbin-spring-boot-starter☆14Mar 1, 2025Updated last year
- Shawazu GB Dumper☆19May 16, 2025Updated 10 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Grail+ is a set of command line tools for manipulating non-deterministic finite automata (NFAs), non-deterministic pushdown automata (PDA…☆10Oct 22, 2016Updated 9 years ago
- setup Ghidra environment for GitHub Actions☆17Jun 19, 2023Updated 2 years ago
- Collection of information and scripts associated with my WWWD DC29 wardriving rig☆14Sep 29, 2021Updated 4 years ago
- data-at-rest updatable threshold encryption KMS server and client☆22Mar 15, 2026Updated last week
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆20Jun 29, 2016Updated 9 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆42Jul 29, 2025Updated 7 months ago
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Binary ninja plugins☆17Sep 15, 2016Updated 9 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- OLE2 Attachment extraction tool☆18Aug 2, 2024Updated last year
- CuteRAT is a stealthy remote access tool without any dependencies☆17Sep 12, 2023Updated 2 years ago
- Orujo allows the execution of several middlewares per route, working seamlessly with the standard net/http library.☆59Nov 22, 2015Updated 10 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Work with IBM i - Productivity Development Manager for Windows (PDM)☆13Jan 8, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.☆17Dec 13, 2021Updated 4 years ago
- Ghidra loader for Super Mario Bros. 3 .nes ROM☆11Aug 17, 2019Updated 6 years ago
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- Cumulative cyclomatic complexity calculation for Ghidra☆20Feb 26, 2026Updated last month