ludiosarchive / unfixed-security-bugs
A list of publicly known but unfixed security bugs
☆238Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for unfixed-security-bugs
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Password lists obtained from strangers attempting to log in to my server.☆220Updated 5 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆161Updated 7 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆100Updated 7 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd☆189Updated 8 years ago
- Tools for auditing WAFS☆458Updated 3 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆133Updated 8 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 8 years ago
- One-click utility to test race conditions☆164Updated 7 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆94Updated 6 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- Running CVE-2017-8759 exploit sample.☆255Updated 4 years ago
- AKA "Internet Chemotherapy"☆64Updated 6 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆219Updated 5 years ago
- Files from my DEFCON CTF VM.☆269Updated 8 years ago
- Local Privilege Escalation☆203Updated 7 years ago
- A webshell framework for penetration testers.☆295Updated 7 months ago
- Seamlessly spy on SSH session like it is your tty☆351Updated 7 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆223Updated 2 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆163Updated last year
- ☆350Updated 3 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 6 years ago
- Recon, Subdomain Bruting, Zone Transfers☆228Updated 8 years ago