moloch-- / reasonably-secure-electronLinks
A pattern for reasonably secure Electron applications
☆73Updated 2 years ago
Alternatives and similar repositories for reasonably-secure-electron
Users that are interested in reasonably-secure-electron are comparing it to the libraries listed below
Sorting:
- ☆29Updated 4 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 3 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Updated 2 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- ☆31Updated 3 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- Some of my public exploits☆51Updated 4 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆46Updated 3 years ago
- Remote Java classpath enumeration via deserialization☆22Updated 2 years ago
- A HTTP PoC Endpoint for cve-2020-5260 which can be deployed to Heroku☆37Updated 5 years ago
- pypykats in your browser☆55Updated 5 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- DupeKeyInjector☆135Updated 3 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- ☆19Updated 8 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 4 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 8 months ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 4 years ago
- Utilities to extract secrets from 1Password☆109Updated 3 years ago
- A Platform for Testing Secure Coding/Config☆18Updated 6 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 4 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆100Updated 2 years ago
- RCE in NPM VSCode Extension☆20Updated 4 years ago
- async parser for JET☆24Updated last year
- Burp with Friends☆103Updated 2 years ago
- Execute MachO binaries in memory using CGo☆81Updated 4 years ago