☆22Jan 26, 2015Updated 11 years ago
Alternatives and similar repositories for rails_exploits
Users that are interested in rails_exploits are comparing it to the libraries listed below
Sorting:
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- First ever web-based cryptocurrency network.☆18Oct 21, 2018Updated 7 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- a simple wii homebrew application demonstrating a simple gba input viewer☆11Apr 22, 2016Updated 9 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110May 12, 2016Updated 9 years ago
- The domain enumeration and scanning tool for hackers☆18Sep 29, 2024Updated last year
- Transcribe Greek text to Latin alphabet using the ISO 843:1997 standard (also known as ELOT 743:1987)☆13Oct 12, 2022Updated 3 years ago
- ☆21Sep 12, 2025Updated 6 months ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- Find websites with script URLs matching given regex☆11Apr 11, 2015Updated 10 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)☆22Aug 31, 2018Updated 7 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- ☆133Nov 6, 2015Updated 10 years ago
- ListACS is an ACS disassembler that supports ZDoom's ACS extensions. It can also attempt to decompile scripts into ACS source code.☆14Jul 22, 2020Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- A fast TLS Cert scanner to scan HTTPS and SMTP servers☆14Sep 18, 2019Updated 6 years ago
- Source from https://twitter.com/pwnallthethings. Compiled in VS 2013☆18Jan 30, 2018Updated 8 years ago
- Who wants to be millionaire game made with MEAN (MongoDB, Express, Angularjs, Nodejs)☆11Mar 27, 2018Updated 7 years ago
- Automatically look for paramater reflections in the HTTP response☆17Apr 30, 2025Updated 10 months ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- A python-based padding oracle tool☆20Updated this week
- 多线程批量扫描ssrf漏洞☆28Sep 6, 2017Updated 8 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- Slides from out talk at BH IL 2022☆29Mar 21, 2022Updated 4 years ago
- Bash script library to expand the many different representations of an IPv6 address☆12Mar 4, 2024Updated 2 years ago
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- Create and install iMessage sticker packs from the command line☆10Oct 6, 2016Updated 9 years ago
- ☆18Jul 22, 2023Updated 2 years ago
- **DEPRECATED** Datadog API Python Client☆25Jul 17, 2018Updated 7 years ago
- AI Agent for Threat Modeling☆13May 27, 2025Updated 9 months ago