A tool for bypass certify pinning in Android apps
☆25Apr 11, 2020Updated 5 years ago
Alternatives and similar repositories for Uncertify
Users that are interested in Uncertify are comparing it to the libraries listed below
Sorting:
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 4 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆18May 2, 2024Updated last year
- Process inject technique "Thread hijacking" via csharp☆15Dec 18, 2021Updated 4 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- CVE-2016-5195 exploit written in Crystal☆13Oct 25, 2016Updated 9 years ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Jun 7, 2022Updated 3 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 3 years ago
- POC exploit for SMBLost vulnerability (CVE-2020-1301)☆17Jun 13, 2020Updated 5 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- Bringing Shikata ga nai to the front html☆23Apr 28, 2022Updated 3 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago
- Copy of Fresh Onions is an open source TOR spider / hidden service onion crawler☆30Jan 5, 2021Updated 5 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- A basic proxylogon scanner☆27Aug 11, 2021Updated 4 years ago
- ☆72Mar 31, 2022Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- A Beacon Object File (BOF) implementation of the 'cat' command☆26Feb 11, 2023Updated 3 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Aug 24, 2022Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆33Apr 21, 2023Updated 2 years ago
- WStalker: an easy proxy☆25May 5, 2020Updated 5 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- ☆38Feb 26, 2025Updated last year
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- Parse command line arguments by defining dataclasses☆13Oct 13, 2024Updated last year
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- Project board - https://github.com/alphagov/verify-local-patterns/projects/1 ||||| This is a prototype of some content that will b…☆11Mar 27, 2018Updated 7 years ago