Python tool for testing vulnerabilities in WebSockets / Socket.IO servers
☆69Mar 4, 2011Updated 15 years ago
Alternatives and similar repositories for socket_io_client
Users that are interested in socket_io_client are comparing it to the libraries listed below
Sorting:
- ☆18Dec 4, 2018Updated 7 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- wifi破解☆12Nov 11, 2016Updated 9 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110May 12, 2016Updated 9 years ago
- It is a note about security on nodejs☆47Jul 16, 2018Updated 7 years ago
- Recursively searches a directory for any file containing a specified string☆48Jul 5, 2015Updated 10 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- RoR / Devise PoC in memory Backdoor☆29Dec 14, 2014Updated 11 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Oct 9, 2020Updated 5 years ago
- A tool for enumerating expired domains in CNAME records☆60Jun 30, 2016Updated 9 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- XSS exploitation tool - access victims through HTTP proxy☆160Mar 19, 2014Updated 11 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- Validate and normalize Swedish bank account numbers, plusgiro and bankgiro.☆34Nov 24, 2025Updated 3 months ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- ☆91Feb 22, 2021Updated 5 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- Stargate☆96Aug 6, 2016Updated 9 years ago
- CVE-2018-3191 反弹shell☆63Oct 23, 2018Updated 7 years ago
- Chrome extension Exploitation Framework☆573Oct 12, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Serial Whitelist Application Trainer☆30Jul 7, 2019Updated 6 years ago