haileys / old-websiteView external linksLinks
☆106May 29, 2022Updated 3 years ago
Alternatives and similar repositories for old-website
Users that are interested in old-website are comparing it to the libraries listed below
Sorting:
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 6 years ago
- Simple multi threaded tool to extract domain related data from commoncrawl.org☆31Jul 17, 2018Updated 7 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 8 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)☆22Aug 31, 2018Updated 7 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Oct 3, 2012Updated 13 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Aug 12, 2019Updated 6 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- Statistically correct benchmarking for Ruby.☆35Jan 27, 2015Updated 11 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Compares New Relic controller_summary.csv to the routes defined in a Rails app☆15Jun 25, 2014Updated 11 years ago
- Avoid cruft with self-expiring code☆24Nov 30, 2015Updated 10 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60May 11, 2015Updated 10 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- This repo contains Writeups for the 35C3CTF.☆48Jan 4, 2019Updated 7 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆142Aug 31, 2021Updated 4 years ago
- awesome、python、C++、linux、database、php、sql、penetration、security、infosec、javascript、tips...☆13Jul 6, 2018Updated 7 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- WS-Attacker is a modular framework for web services Security penetration testing.☆12May 16, 2019Updated 6 years ago
- filetransfer via a webrtc datachannel☆13Nov 24, 2017Updated 8 years ago
- PD API examples.☆10May 26, 2016Updated 9 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- A client compatible with Metasploit's staging protocol☆263Aug 21, 2017Updated 8 years ago
- NewRelic instrumentation for redis☆75Nov 20, 2017Updated 8 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago