Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.
☆23Aug 28, 2013Updated 12 years ago
Alternatives and similar repositories for MalaRIA-Proxy
Users that are interested in MalaRIA-Proxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RetDec Offline Decompiler☆46Feb 11, 2020Updated 6 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Meterpreter Scripts that I'm working on☆171Jan 28, 2019Updated 7 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Setup Ghidra environment for GitHub Actions☆16Apr 27, 2026Updated last week
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- An introductory tutorial for the Coq proof assistant.☆10Feb 5, 2019Updated 7 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 11 years ago
- the userspace side of Linux' CONFIG_STATIC_USERMODEHELPER☆17Mar 22, 2024Updated 2 years ago
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 10 months ago
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆15Apr 14, 2026Updated 3 weeks ago
- Example for casbin-spring-boot-starter☆15Mar 1, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Grail+ is a set of command line tools for manipulating non-deterministic finite automata (NFAs), non-deterministic pushdown automata (PDA…☆10Oct 22, 2016Updated 9 years ago
- setup Ghidra environment for GitHub Actions☆17Jun 19, 2023Updated 2 years ago
- data-at-rest updatable threshold encryption KMS server and client☆21Apr 16, 2026Updated 2 weeks ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆67Aug 6, 2020Updated 5 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆20Jun 29, 2016Updated 9 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Ghidra extension for running Kotlin scripts☆16May 21, 2020Updated 5 years ago
- ☆12Jul 27, 2017Updated 8 years ago
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 13 years ago
- File hosting service☆13May 28, 2017Updated 8 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- OLE2 Attachment extraction tool☆18Aug 2, 2024Updated last year
- CuteRAT is a stealthy remote access tool without any dependencies☆17Sep 12, 2023Updated 2 years ago
- Authenticated encryption scheme prover/synthesizer☆16Aug 25, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Oct 18, 2017Updated 8 years ago
- Orujo allows the execution of several middlewares per route, working seamlessly with the standard net/http library.☆59Nov 22, 2015Updated 10 years ago
- This is my walkthrough for the CMU binary bomb challenge☆15Jul 21, 2015Updated 10 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.☆17Dec 13, 2021Updated 4 years ago
- Experimental High Assurance Cryptographic Library☆21Feb 1, 2016Updated 10 years ago