HTTP Desync Attack
☆28May 17, 2020Updated 5 years ago
Alternatives and similar repositories for dc2020q-uploooadit
Users that are interested in dc2020q-uploooadit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- HTTP.ninja☆147Sep 3, 2023Updated 2 years ago
- ☆19Jan 2, 2021Updated 5 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- ☆12Apr 28, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Gets events from the Office 365 unified audit log and outputs their details into the pipeline☆16Dec 16, 2020Updated 5 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Windows Common Log File System Driver POC☆95Dec 21, 2021Updated 4 years ago
- ☆135Dec 15, 2019Updated 6 years ago
- AngrPT recover the Windows Driver's DeviceIoControl Interface and Dependencies for getting higher coverage in Fuzzing Process.☆21Jan 20, 2026Updated 2 months ago
- ☆22Sep 17, 2019Updated 6 years ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆392Aug 15, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Those are my challenges for multiple CTF!☆10Mar 17, 2024Updated 2 years ago
- Pysh: the python shell☆20Nov 15, 2016Updated 9 years ago
- For effective cheating detection in security competitions. Uses Linux Kernel Module (LKM) for generating flags.☆69Jan 17, 2023Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Jun 27, 2019Updated 6 years ago
- ☆24Jan 21, 2021Updated 5 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- IRPT: The Art, Science, and Engineering of Windows driver fuzzing☆21Mar 26, 2021Updated 5 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Oct 13, 2020Updated 5 years ago
- Some of my public exploits☆52Sep 15, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago
- ChaetSheet for Pwn Reversing of CTF☆32Aug 28, 2020Updated 5 years ago
- ☆20Jul 21, 2024Updated last year
- ☆19Mar 24, 2017Updated 9 years ago
- Hacky scripts to fixup stack strings in Ghidra's decompiler.☆36May 22, 2022Updated 3 years ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- ☆15Oct 27, 2022Updated 3 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- LLVM-based ROP obfuscated compiler☆13Mar 24, 2022Updated 4 years ago
- List of Dockers compiled from various CTFs☆33Mar 20, 2021Updated 5 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Sep 14, 2023Updated 2 years ago
- Security Advisories☆38Feb 8, 2026Updated last month
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆76Oct 18, 2018Updated 7 years ago
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- Summoner tracker overlay that synchronizes between teammates☆10Mar 23, 2023Updated 3 years ago