jboecker / dcs-arduino-example
This is an old example. I suggest using DCS-BIOS instead.
☆11Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for dcs-arduino-example
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆36Updated 7 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 3 months ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆107Updated 6 years ago
- PowerShell module for the exploitation and testing☆16Updated 9 years ago
- Metasploit Framework☆31Updated 4 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 4 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆37Updated 6 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 5 years ago
- pentest floating repo (based off git submodules), and some useful scripts i wrote☆28Updated 2 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Updated 7 years ago
- ☆13Updated 8 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆52Updated 6 years ago
- A collection of hashcat-hcstat files☆28Updated 6 years ago
- A weaponized version of CVE-2018-9206☆62Updated 6 years ago
- CVE-2018-6546-Exploit☆41Updated 6 years ago
- Memcache hacking tool.☆47Updated 7 years ago
- Unified repository for different Metasploit Framework payloads☆47Updated 4 years ago
- Python api for usage with cobalt strike's External C2 specification☆61Updated 6 years ago
- One off Scripts repo☆25Updated last year
- Flash XSS Scanner☆51Updated 8 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 7 years ago