Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.
☆23Aug 28, 2013Updated 12 years ago
Alternatives and similar repositories for MalaRIA-Proxy
Users that are interested in MalaRIA-Proxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- QL Workshop☆16Sep 30, 2019Updated 6 years ago
- Abusing U2F to 'store' a stable secret☆15Nov 23, 2015Updated 10 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Lua binding to the nDPI library using the LuaJIT FFI☆16Nov 5, 2020Updated 5 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 3 years ago
- Burp Intruder File Payload Generator☆18Oct 27, 2019Updated 6 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- IDA Terminal☆18Feb 27, 2026Updated last month
- Meterpreter Scripts that I'm working on☆171Jan 28, 2019Updated 7 years ago
- Setup Ghidra environment for GitHub Actions☆16Apr 6, 2026Updated last week
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Python module wrapping Bindiff usage into a Python API.☆23Jan 20, 2026Updated 2 months ago
- An introductory tutorial for the Coq proof assistant.☆10Feb 5, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- Scripts and code to run a public ADOM game server☆11Jun 16, 2018Updated 7 years ago
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 9 months ago
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆15Apr 8, 2026Updated last week
- Example for casbin-spring-boot-starter☆14Mar 1, 2025Updated last year
- Public version of PDF X-RAY☆59Apr 9, 2012Updated 14 years ago
- Shawazu GB Dumper☆19May 16, 2025Updated 11 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Grail+ is a set of command line tools for manipulating non-deterministic finite automata (NFAs), non-deterministic pushdown automata (PDA…☆10Oct 22, 2016Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆67Aug 6, 2020Updated 5 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆20Jun 29, 2016Updated 9 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- A Ghidra extension for running Kotlin scripts☆16May 21, 2020Updated 5 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆42Jul 29, 2025Updated 8 months ago
- ANTLR 3 fuzzy parser☆50Jan 21, 2013Updated 13 years ago
- ☆12Jul 27, 2017Updated 8 years ago
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Binary ninja plugins☆17Sep 15, 2016Updated 9 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- CuteRAT is a stealthy remote access tool without any dependencies☆17Sep 12, 2023Updated 2 years ago
- Authenticated encryption scheme prover/synthesizer☆16Aug 25, 2022Updated 3 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Oct 18, 2017Updated 8 years ago
- Orujo allows the execution of several middlewares per route, working seamlessly with the standard net/http library.☆59Nov 22, 2015Updated 10 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago