A script that inspects multi-byte character sets looking for characters with specific user-defined properties
☆27Jun 23, 2016Updated 9 years ago
Alternatives and similar repositories for charsetinspect
Users that are interested in charsetinspect are comparing it to the libraries listed below
Sorting:
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- FIDO 2.0 authentication library for PHP☆15Apr 7, 2016Updated 9 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- A simple Android Remote Administration Tool written for https://0x00sec.org!☆36Jul 27, 2016Updated 9 years ago
- intel amt honeypot☆18May 9, 2017Updated 8 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Decode the cookies set by balancer F5, and disclousure all pool ip☆78Oct 26, 2019Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- Exploits backed up from http://1337day.com in the 2011☆20Jan 27, 2021Updated 5 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- ☆42May 10, 2016Updated 9 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- An ES2016 decorator that efficiently binds your component's unique class methods.☆22Jun 12, 2018Updated 7 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated last month
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Exploit code developed/reproduced by me☆90Jan 25, 2023Updated 3 years ago
- Tagging and annotation framework for scan data☆100Oct 16, 2018Updated 7 years ago
- Automatic XSS filter bypass☆90Aug 20, 2015Updated 10 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago