rop4sh / poc-redisView external linksLinks
☆16Jul 1, 2024Updated last year
Alternatives and similar repositories for poc-redis
Users that are interested in poc-redis are comparing it to the libraries listed below
Sorting:
- antSword的源码和加载器☆14Jan 24, 2023Updated 3 years ago
- FastJsonAutoTypeBypass☆16Apr 14, 2021Updated 4 years ago
- CTF Challenge☆18Nov 20, 2020Updated 5 years ago
- POC for CVE-2025-54918 and a technical demonstration.☆50Jan 12, 2026Updated last month
- A simple but fast traffic forwarder with routing.☆22Jan 3, 2026Updated last month
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 6 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Path traversal in Ollama with rogue registry server☆51Jun 28, 2024Updated last year
- ☆75Sep 3, 2025Updated 5 months ago
- Collection of CTF challenges I made☆17Apr 2, 2018Updated 7 years ago
- poc code for CVE-2024-38080☆30Sep 1, 2024Updated last year
- ☆40Apr 23, 2025Updated 9 months ago
- ☆37Jan 7, 2025Updated last year
- KrbRoastParser is a tool for parsing Kerberos packets from pcap files to extract AS-REQ, AS-REP and TGS-REP hashes☆57Sep 12, 2025Updated 5 months ago
- ☆36Mar 4, 2025Updated 11 months ago
- Linux Process Injection via Seccomp Notifier☆81Dec 9, 2025Updated 2 months ago
- ☆37Nov 16, 2023Updated 2 years ago
- ☆10Aug 18, 2021Updated 4 years ago
- 使用 agent 实现反序列化 utf8 overlong☆83Apr 24, 2024Updated last year
- Validates priv escalation of AD trusts☆48Apr 1, 2025Updated 10 months ago
- A penetration toolkit for container environment☆122Jan 29, 2026Updated 2 weeks ago
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- TreeFuser is a tool that perform traversals fusion for recursive tree traversals written in subset of the c++ language.☆11Aug 13, 2023Updated 2 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Java Security Documents☆81Sep 19, 2019Updated 6 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆11Sep 5, 2019Updated 6 years ago
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- CVE-2024-40711-exp☆42Oct 17, 2024Updated last year
- bypass BeaconEye☆89Sep 9, 2021Updated 4 years ago
- PostgreSQL 提权辅助脚本☆34Aug 23, 2021Updated 4 years ago
- WPS 0day.hen the wps software is running, an api interface with port 4709 will be opened. An attacker can request this interface to execu…☆98Aug 26, 2024Updated last year
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆64Mar 1, 2025Updated 11 months ago
- PoC for ManageEngine ADAudit Plus CVE-2022-28219☆45Jun 26, 2022Updated 3 years ago
- ☆12Nov 25, 2024Updated last year
- programmatic binary patching using ptrace☆13Aug 9, 2025Updated 6 months ago