Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding Internet RFCs
☆19Jan 28, 2021Updated 5 years ago
Alternatives and similar repositories for RFC-Security-Research
Users that are interested in RFC-Security-Research are comparing it to the libraries listed below
Sorting:
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Jul 7, 2021Updated 4 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- Hacking Artifactory with server side template injection☆51Mar 12, 2020Updated 5 years ago
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 10 months ago
- ☆21Nov 13, 2019Updated 6 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- A Tools For Spoon (https://spooncast.net), to Increase Tap Love, Fans, Viewers Of Fans, Report, and etc.☆10Nov 9, 2022Updated 3 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- Go Damn Vulnerable Web App☆24Jul 16, 2024Updated last year
- XXE Injection Payloads☆28Jul 30, 2019Updated 6 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- Static analysis of wordpress plugins☆59Dec 16, 2020Updated 5 years ago
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Aug 28, 2020Updated 5 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Aug 19, 2020Updated 5 years ago
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆36Dec 15, 2025Updated 2 months ago
- ☆73Nov 5, 2018Updated 7 years ago
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- A tool for sorting blocks of lines☆36Oct 4, 2022Updated 3 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Turn your VPS into an attack box☆34Mar 17, 2024Updated last year
- Config files for my GitHub profile.☆11Feb 26, 2026Updated last week
- ☆12Jul 13, 2020Updated 5 years ago
- This is a collection of stealers for educational purposes☆21Aug 13, 2025Updated 6 months ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- Logr - logging and metrics service☆14Jul 6, 2025Updated 7 months ago
- Spear Phising Attack With Custom Cloned Website Login Page☆10Nov 18, 2019Updated 6 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago