moloch-- / reasonably-secure-electronLinks
A pattern for reasonably secure Electron applications
☆73Updated 2 years ago
Alternatives and similar repositories for reasonably-secure-electron
Users that are interested in reasonably-secure-electron are comparing it to the libraries listed below
Sorting:
- ☆30Updated 4 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- A CLI tool for querying passive DNS services☆42Updated 2 years ago
- A curated list of argument injection vectors☆41Updated 10 months ago
- ☆31Updated 4 years ago
- Remote Java classpath enumeration via deserialization☆22Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Updated 3 months ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- TypeScript/JavaScript client libraries for Sliver☆23Updated 2 years ago
- Burp Extension for AWS Signing☆90Updated 11 months ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆16Updated 2 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Updated 3 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- d(ockerp)wn - a docker pwn tool manager☆155Updated 4 years ago
- pypykats in your browser☆56Updated 6 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆40Updated 6 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- Electron based screenshot scanner☆68Updated 2 years ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- Some of my public exploits☆51Updated 5 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- A Platform for Testing Secure Coding/Config☆19Updated 7 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- Dependency Combobulator☆94Updated last year