moloch-- / reasonably-secure-electronLinks
A pattern for reasonably secure Electron applications
☆73Updated 2 years ago
Alternatives and similar repositories for reasonably-secure-electron
Users that are interested in reasonably-secure-electron are comparing it to the libraries listed below
Sorting:
- ☆29Updated 4 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- ☆31Updated 4 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Remote Java classpath enumeration via deserialization☆22Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆58Updated 3 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 4 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆32Updated 7 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- A curated list of argument injection vectors☆41Updated 7 months ago
- Presentations from the CX Security Labs team☆33Updated last month
- A CLI tool for querying passive DNS services☆41Updated last year
- ☆19Updated 8 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- Red team oriented key finder and correlator☆20Updated last month
- Some of my public exploits☆51Updated 4 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆32Updated 4 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆23Updated 6 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆11Updated last week
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- UUID issues for Burp Suite☆52Updated 3 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆14Updated 2 years ago