A cybersecurity challenge, based on a real world finding
☆12Jul 11, 2024Updated last year
Alternatives and similar repositories for mnmlsm
Users that are interested in mnmlsm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Useful configurations for the DomLogger++ extension☆48Sep 7, 2024Updated last year
- Discover hidden parameters in Caido☆48Jan 30, 2026Updated last month
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- A list of "secrets" from JWT sample code and readme files.☆57Oct 28, 2020Updated 5 years ago
- My ctf challenges, mostly cryptography☆15Jul 13, 2025Updated 8 months ago
- ☆35Aug 5, 2025Updated 7 months ago
- Tool for monitoring shared event loops with Javascript☆12Feb 19, 2018Updated 8 years ago
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- ☆154Aug 18, 2023Updated 2 years ago
- Custom arrows and square highlights for lichess.org☆16Jan 27, 2026Updated last month
- ☆19Aug 26, 2020Updated 5 years ago
- ☆61Sep 8, 2025Updated 6 months ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Displays HDF5 files in VS code☆11Dec 20, 2022Updated 3 years ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Dec 19, 2023Updated 2 years ago
- Dompdf RCE PoC Exploit - CVE-2022-28368☆16Jan 19, 2024Updated 2 years ago
- ☆19Jul 14, 2025Updated 8 months ago
- ☆13Mar 4, 2021Updated 5 years ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆27Mar 17, 2024Updated 2 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- This script is used to automatically start/stop ec2 instance to match target ip in aws ip pool to takeover subdomain..☆17Oct 8, 2023Updated 2 years ago
- ☆27May 25, 2022Updated 3 years ago
- Offensive Web is a documentation website about web security research, bypass and new exploitation techniques.☆33Feb 14, 2026Updated last month
- A simple very little blockchain, just for learning.☆27Dec 2, 2019Updated 6 years ago
- Addon Stremio optimisé pour le streaming francophone. Intègre indexeurs torrents, services debrid et fonctionnalités avancées pour une ex…☆18Mar 2, 2026Updated 3 weeks ago
- Statement on Codegate Qualifiers 2023☆11Jun 19, 2023Updated 2 years ago
- Rust-based linux reverse shell listener.☆12Aug 7, 2024Updated last year
- A simple pickle assembler to make handcrafting pickle bytecode easier.☆15Apr 16, 2021Updated 4 years ago
- a hackbot proof-of-concept☆41Feb 24, 2024Updated 2 years ago
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆779Dec 9, 2025Updated 3 months ago
- Chrome(CVE-2024-2887)RCE-POC☆14Aug 25, 2024Updated last year
- Load or create saves for the game Turing Complete☆28Oct 20, 2022Updated 3 years ago
- ☆17Apr 27, 2023Updated 2 years ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆228Feb 6, 2025Updated last year
- Generate Emails for a company/website from a given list of names.☆31Oct 16, 2022Updated 3 years ago
- A tool to migrate Burpsuite HTTP history to Caido☆35Apr 25, 2025Updated 11 months ago
- Database for the notes feature on Jisho.org☆14Oct 31, 2024Updated last year
- ☆24Dec 31, 2025Updated 2 months ago