p0dalirius / objectwalkerLinks
A python module to explore the object tree to extract paths to interesting objects in memory.
☆101Updated last year
Alternatives and similar repositories for objectwalker
Users that are interested in objectwalker are comparing it to the libraries listed below
Sorting:
- Some tips for Bug Bounty using LibreOffice☆56Updated 11 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆102Updated 10 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆62Updated 7 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆53Updated 3 years ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated last year
- ☆51Updated 4 years ago
- A complete table of results of types comparison in multiple languages☆36Updated 3 years ago
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆132Updated last month
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆163Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆67Updated last year
- HTML Universal Identifier☆65Updated last year
- Official writeups for Business CTF 2024: The Vault Of Hope☆159Updated last year
- PP-finder Help you find gadget for prototype pollution exploitation☆187Updated last year
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆140Updated 8 months ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆113Updated 8 months ago
- An automatic Blind ROP exploitation tool☆207Updated 2 years ago
- CVE-2023-33733 reportlab RCE☆119Updated 2 years ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆31Updated 9 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆117Updated last week
- ☆96Updated 6 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Updated 11 months ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆52Updated last year
- ☆94Updated last month
- Get root via TTY / TIOCSTI stuffing☆76Updated 8 months ago
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆109Updated 7 months ago
- Web interface to explore Suricata EVE outputs☆84Updated 3 weeks ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- Challenges of the HeroCTF v4 edition.☆35Updated 2 years ago
- A cross platform library to write offensive and defensive security tools in Go☆130Updated last month
- A (small) web exploit framework☆97Updated last month