OS Command Execution
☆28Aug 23, 2018Updated 7 years ago
Alternatives and similar repositories for xdebug-exploit
Users that are interested in xdebug-exploit are comparing it to the libraries listed below
Sorting:
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- EyesOfNetwork 5.1 to 5.3 exploits☆13Mar 5, 2020Updated 6 years ago
- Collection of ctf write-up source codes.☆16Jun 28, 2021Updated 4 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆23Jan 13, 2022Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆25May 13, 2020Updated 5 years ago
- CVE-2021-27928 MariaDB/MySQL-'wsrep provider' 命令注入漏洞☆63Jun 29, 2023Updated 2 years ago
- Extract all users from an Active Directory domain to an Excel worksheet.☆35Jan 31, 2025Updated last year
- Exploit for CVE-2021-3129☆68Mar 7, 2021Updated 4 years ago
- add the charles ssl certificate to an android .apk file. Use that modified .apk to collect HTTP traffic.☆11Mar 21, 2023Updated 2 years ago
- 整合了 binance 以及 bittrex 交易所数据接口 目前主要在 Binance 新增个人量化交易策略,欢迎同行交流学习☆10Feb 11, 2026Updated 3 weeks ago
- Jupyter中文集成版(Python整合版),是把python3.8和jupyter notebook高度集成,jupyter傻瓜式安装,用最简洁友好的纯中文方式(jupyter汉化100%)展现出来的优秀Jupyter绿色使用工具。本工具,把Jupyter的复杂操作简单…☆12Feb 11, 2022Updated 4 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- API specification of the USB WiFi Monitor Android app☆25May 17, 2025Updated 9 months ago
- Update playlist☆22Updated this week
- 🏍Fast Home Delivery App of Grocery ,Medicines , Vegetables ,etc during lockdown . Client can send Handwritten List Photo ,Chat with Shop…☆11Jun 27, 2020Updated 5 years ago
- An Agentic Skill System for Antigravity, transforming Spec-Driven Development into autonomous AI capabilities for the entire SDLC.☆23Jan 27, 2026Updated last month
- ll In One Tool For Info Gathering, SQL Vulnerability Scannig and Crawling☆13Jun 10, 2017Updated 8 years ago
- Shell Simulation over Net-SNMP with extend functionality☆100Jan 18, 2021Updated 5 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆15Nov 29, 2023Updated 2 years ago
- The set of released emails of Jeffrey Epstein processed into an Obsidian Vault using the Obsidian Importer plugin an Claude Code.☆26Nov 15, 2025Updated 3 months ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Kubernetes Fundamentals Book☆14Feb 5, 2019Updated 7 years ago
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…☆11Oct 8, 2025Updated 4 months ago
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆35Feb 27, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- A simple Go script to brute force or parse a password-protected PKCS#12 (PFX/P12) file.☆44Dec 31, 2020Updated 5 years ago
- Demonstrate and showcasing how you can hide payload or secret message inside an image, audio, and PDF file and how an unethical person mi…☆12Jul 23, 2021Updated 4 years ago
- Track and notify of changes to server configuration files using git.☆12Dec 7, 2011Updated 14 years ago
- A multi-purpose, programming oriented Discord bot.☆16Jul 11, 2025Updated 7 months ago
- The repository contains Criminal IP Asset Search data in STIX 2.1 JSON format, enabling a quick understanding of threat information for s…☆11Jan 29, 2024Updated 2 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- OSINT tools can be used for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team operations and…☆14Jul 2, 2024Updated last year
- Icons and logos from various vendors of the coding community☆13Feb 18, 2016Updated 10 years ago
- 一个可以全端口捕获流量的简易蜜罐 tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆13Aug 3, 2022Updated 3 years ago
- Reliable UDP, Author Whg☆15Oct 8, 2019Updated 6 years ago
- Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve☆15Jul 16, 2022Updated 3 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago