pete911 / zip-bombView external linksLinks
scripts to create zip bombs
☆12Nov 26, 2012Updated 13 years ago
Alternatives and similar repositories for zip-bomb
Users that are interested in zip-bomb are comparing it to the libraries listed below
Sorting:
- ☆15Mar 2, 2014Updated 11 years ago
- A scriptable debugger library to interact with Android applications☆46Sep 27, 2013Updated 12 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- A documentation generator for NASL.☆18May 31, 2022Updated 3 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- RoR / Devise PoC in memory Backdoor☆29Dec 14, 2014Updated 11 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- Windows Privesc Check - PowerShell☆67Apr 22, 2022Updated 3 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Nov 8, 2012Updated 13 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆87Mar 27, 2019Updated 6 years ago
- A python tool for sms bombing only Robi and Airtel numbers.☆13Feb 24, 2025Updated 11 months ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Jul 25, 2021Updated 4 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- Just another blog engine☆10Jan 17, 2026Updated 3 weeks ago
- Fortigate Autoscale: A collection of Node.js modules and cloud specific templates which support basic autoscale functionality for groups …☆11Jun 1, 2021Updated 4 years ago
- Data Hiding in Image☆10Apr 9, 2020Updated 5 years ago
- IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime…☆12Sep 10, 2020Updated 5 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆37Nov 16, 2015Updated 10 years ago
- Provide secure unzip against zip bomb .☆37Dec 3, 2020Updated 5 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- A toy project for extracting the amounts from a paper receipt☆13Apr 29, 2013Updated 12 years ago
- ☆11Jul 10, 2024Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 2 months ago