moloch-- / reasonably-secure-electron
A pattern for reasonably secure Electron applications
☆73Updated last year
Related projects ⓘ
Alternatives and complementary repositories for reasonably-secure-electron
- TypeScript/JavaScript client libraries for Sliver☆19Updated last year
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆23Updated 6 years ago
- A framework for exploiting padding oracles in network-based applications☆25Updated last year
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆57Updated 4 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆34Updated 2 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 4 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 2 years ago
- Remote Java classpath enumeration via deserialization☆22Updated last year
- ☆29Updated 3 years ago
- Ingest openldap data into bloodhound☆78Updated 3 years ago
- Mara is a userland pty/tty sniffer☆52Updated 11 months ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 3 years ago
- Burp with Friends☆99Updated last year
- NAT Slipstream attack code samples☆46Updated 3 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 3 years ago
- Presentations from the CX Security Labs team☆32Updated last month
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- ☆89Updated 5 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆19Updated last year
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆44Updated 2 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 7 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆39Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- Abusing SketchUp to make persistence on Windows☆20Updated 5 years ago
- ☆19Updated 4 years ago
- ☆3Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆53Updated 3 years ago
- A CLI tool for querying passive DNS services☆41Updated 11 months ago