evilsocket / jscytheLinks
Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.
☆331Updated last year
Alternatives and similar repositories for jscythe
Users that are interested in jscythe are comparing it to the libraries listed below
Sorting:
- Intercept stdin/stdout/stderr for any process☆199Updated 2 years ago
- Take over macOS Electron apps' TCC permissions☆211Updated 2 years ago
- ☆205Updated 11 months ago
- A crossplatform mDNS enumeration tool.☆356Updated 3 years ago
- Execute ELF files without dropping them on disk☆498Updated last year
- ☆169Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆797Updated 3 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated 2 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆139Updated 2 years ago
- A web client port-scanner written in GO, that supports the WASM/WASI interface for Browser WebAssembly runtime execution.☆155Updated 2 years ago
- Blazing fast, advanced Padding Oracle exploit☆255Updated last month
- macOS persistence tool☆226Updated 3 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆866Updated 6 months ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.☆214Updated 3 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆196Updated last year
- Minimal code to connect to a CEF debugger.☆209Updated 5 years ago
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆236Updated 2 years ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆302Updated last week
- tool for generating wordlists or extending an existing one using mutations.☆389Updated 3 months ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆106Updated 4 months ago
- ☆243Updated 3 years ago
- ☆49Updated 3 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Updated 3 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- ☆63Updated 2 years ago
- A structure-aware HTTP fuzzing library☆215Updated 9 months ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- Comprehensive toolkit for Ghidra headless.☆359Updated 5 months ago