mrrobot1o1 / asnipsView external linksLinks
☆20May 24, 2021Updated 4 years ago
Alternatives and similar repositories for asnips
Users that are interested in asnips are comparing it to the libraries listed below
Sorting:
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆18Dec 8, 2024Updated last year
- CVE-2019-6340 POC Drupal rce☆12Feb 25, 2019Updated 6 years ago
- I will provide details and pocs for some bugs I found.☆41Apr 15, 2024Updated last year
- 本程序在后台持续运行,通过headless chrome获取hackerone最新漏洞,发送邮件给安全人员。☆16Jun 18, 2024Updated last year
- Python exploit of cve-2020-7247☆25Feb 19, 2020Updated 5 years ago
- The Demo for CVE-2017-11427☆12Mar 3, 2018Updated 7 years ago
- ☆19Oct 4, 2021Updated 4 years ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated last year
- Yahoo subdomains for bug bounty☆22Mar 22, 2019Updated 6 years ago
- Implementation of the Web Cache Deception detection methodology presented in the paper "Web Cache Deception Escalates!"☆25Jun 11, 2024Updated last year
- unicode abnormalizer to takes a unicode string and abnormalizes it by character replacment☆26Jun 27, 2020Updated 5 years ago
- List all public repositories for (valid) GitHub usernames☆76Sep 25, 2023Updated 2 years ago
- NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.☆78Nov 5, 2022Updated 3 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 4 years ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated last month
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- System Validation Platform☆12Sep 18, 2025Updated 4 months ago
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆38May 17, 2025Updated 8 months ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- 团队更名为 QAX A-TEAM☆10Apr 28, 2019Updated 6 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- Cross Domain XHR: A drop-in replacement for XmlHttpRequest object.☆61Jan 31, 2013Updated 13 years ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆49Jan 16, 2025Updated last year
- springboot getRequestURI acl bypass☆37Oct 13, 2020Updated 5 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- IDA plugin to Display Mach-O headers☆21Nov 4, 2011Updated 14 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- ☆12Dec 25, 2020Updated 5 years ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- ☆12Feb 22, 2024Updated last year
- Easily set Mac Retina display to higher unsupported resolutions☆12Feb 5, 2023Updated 3 years ago
- Android library for recognizing java classes and methods based on their signatures☆10Mar 18, 2020Updated 5 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ☆10Jul 30, 2018Updated 7 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Apr 24, 2023Updated 2 years ago
- ☆12Jan 28, 2023Updated 3 years ago