p0dalirius / objectwalkerLinks
A python module to explore the object tree to extract paths to interesting objects in memory.
☆101Updated 6 months ago
Alternatives and similar repositories for objectwalker
Users that are interested in objectwalker are comparing it to the libraries listed below
Sorting:
- Some tips for Bug Bounty using LibreOffice☆48Updated 6 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 4 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆58Updated 2 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆50Updated 2 years ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆28Updated 3 months ago
- A complete table of results of types comparison in multiple languages☆33Updated 2 years ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Updated 11 months ago
- HTML Universal Identifier☆67Updated 8 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆151Updated 9 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆153Updated 8 months ago
- PP-finder Help you find gadget for prototype pollution exploitation☆176Updated last year
- ☆35Updated 2 years ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆45Updated last year
- ☆49Updated 3 years ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆66Updated 10 months ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆94Updated 2 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆153Updated 6 months ago
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆121Updated this week
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆73Updated 2 weeks ago
- POC for CVE-2021-41091☆65Updated 2 years ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆104Updated 3 months ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆94Updated last month
- This repository is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as Content Security Policy (CSP) an…☆84Updated 3 weeks ago
- Styx is an cross-platform GUI interface for HackTheBox made in GoLang☆24Updated last year
- ☆89Updated last month
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- CVE-2023-33733 reportlab RCE☆120Updated last year
- Fast exfiltration of text using only CSS and Ligatures☆58Updated 4 months ago