evilsocket / jscythe
Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.
☆327Updated 7 months ago
Alternatives and similar repositories for jscythe:
Users that are interested in jscythe are comparing it to the libraries listed below
- Take over macOS Electron apps' TCC permissions☆201Updated last year
- Intercept stdin/stdout/stderr for any process☆198Updated 2 years ago
- A crossplatform mDNS enumeration tool.☆351Updated 2 years ago
- ☆203Updated 5 months ago
- A structure-aware HTTP fuzzing library☆212Updated 4 months ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆509Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- ☆63Updated 2 years ago
- Execute ELF files without dropping them on disk☆491Updated 9 months ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆296Updated last week
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z, jar, war, apk and ipa …☆98Updated last week
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆185Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆167Updated last year
- A web client port-scanner written in GO, that supports the WASM/WASI interface for Browser WebAssembly runtime execution.☆148Updated last year
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆224Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆825Updated last month
- 🌒 Shell command obfuscation to avoid detection systems☆125Updated 2 years ago
- Blazing fast, advanced Padding Oracle exploit☆253Updated 11 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆379Updated last year
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆122Updated 3 years ago
- eBPF hacks☆186Updated 4 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆243Updated 2 years ago
- ☆301Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆788Updated 2 years ago
- Comprehensive toolkit for Ghidra headless.☆355Updated this week
- An automatic Blind ROP exploitation tool☆201Updated last year
- Collection of macOS persistence methods and miscellaneous tools in JXA☆274Updated last year
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆498Updated 4 months ago
- ☆123Updated last year
- ☆243Updated 2 years ago