☆22Jan 26, 2015Updated 11 years ago
Alternatives and similar repositories for rails_exploits
Users that are interested in rails_exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Jun 26, 2017Updated 8 years ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- A simple npm module that checks to see whether or not a medical marijuana patient's recommendation ID is valid or not.☆10Dec 11, 2022Updated 3 years ago
- Kamaelia is a toolset that had the aim of making working with concurrency simple and reusable. It is now retired in favour of Guild. (Thi…☆15Aug 17, 2025Updated 7 months ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110May 12, 2016Updated 9 years ago
- The domain enumeration and scanning tool for hackers☆18Sep 29, 2024Updated last year
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- ☆19Sep 15, 2021Updated 4 years ago
- ☆21Sep 12, 2025Updated 6 months ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A site to easily decode the content of Rails sessions stored in cookies.☆16Jan 26, 2014Updated 12 years ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)☆22Aug 31, 2018Updated 7 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- ☆134Nov 6, 2015Updated 10 years ago
- ListACS is an ACS disassembler that supports ZDoom's ACS extensions. It can also attempt to decompile scripts into ACS source code.☆14Jul 22, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- PHP library for all of Runescape's web services☆10Mar 4, 2022Updated 4 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago
- A fast TLS Cert scanner to scan HTTPS and SMTP servers☆14Sep 18, 2019Updated 6 years ago
- This bot buys and sells any currency on BTC-e in an attempt to make profit.☆11Sep 25, 2014Updated 11 years ago
- NSEC3 Zone Walker☆13Nov 27, 2025Updated 4 months ago
- Source from https://twitter.com/pwnallthethings. Compiled in VS 2013☆18Jan 30, 2018Updated 8 years ago
- Who wants to be millionaire game made with MEAN (MongoDB, Express, Angularjs, Nodejs)☆11Mar 27, 2018Updated 8 years ago
- 🐽 Detection version of framework \ CMS \ dev-dependence on target website.☆99Feb 11, 2019Updated 7 years ago
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- 多线程批量扫描ssrf漏洞☆28Sep 6, 2017Updated 8 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- Bash script library to expand the many different representations of an IPv6 address☆12Mar 4, 2024Updated 2 years ago
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- Open source code and resources arising from the ATI-funded Data Science for Cybersecurity project☆15Dec 4, 2019Updated 6 years ago
- **DEPRECATED** Datadog API Python Client☆25Jul 17, 2018Updated 7 years ago