A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities
☆67Mar 18, 2024Updated 2 years ago
Alternatives and similar repositories for Todesstern
Users that are interested in Todesstern are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A MBR Fuzzer☆31Apr 3, 2024Updated 2 years ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆36Nov 5, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆30Oct 26, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- ☆20Jan 19, 2026Updated 3 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Aug 19, 2024Updated last year
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 10 months ago
- Proof-of-Concept for CVE-2024-21345☆78Apr 26, 2024Updated last year
- ☆23Apr 6, 2019Updated 7 years ago
- ☆32May 27, 2024Updated last year
- Proof-of-Concept for CVE-2024-26218☆56Apr 26, 2024Updated last year
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆21May 8, 2025Updated 11 months ago
- CVE-2024-24576 Proof of Concept☆20Apr 10, 2024Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆77Jul 31, 2024Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆107Apr 18, 2024Updated 2 years ago
- ☆257Jul 31, 2024Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- Hide your P/Invoke signatures through other people's signed assemblies☆210Mar 10, 2024Updated 2 years ago
- IDA Hexrays To Joern☆46Nov 7, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 5 months ago
- Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)☆50Oct 2, 2024Updated last year
- FortiGate automatic repack script☆24Jul 4, 2023Updated 2 years ago
- ☆44Jul 9, 2024Updated last year
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated last year
- Modelizer - is a framework for learning models from BlackBox systems using Input-Output examples☆22Apr 9, 2026Updated last week
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- ☆10Jun 15, 2024Updated last year
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 4 years ago
- ☆125Sep 5, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆45Oct 9, 2024Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆357Dec 14, 2023Updated 2 years ago
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year