scarvell / advisoriesLinks
β27Updated 2 years ago
Alternatives and similar repositories for advisories
Users that are interested in advisories are comparing it to the libraries listed below
Sorting:
- Command line fuzzer and bruteforcer πͺ wfuzz for commandβ90Updated 3 years ago
- β116Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021β27Updated 3 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org wβ¦β89Updated 6 months ago
- β25Updated last month
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serveβ¦β55Updated 4 years ago
- Ansible build for Afl++ Frida-Modeβ25Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote rootβ21Updated 2 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.β45Updated 2 years ago
- Posts about different topicsβ40Updated last month
- ELF Sectional docking payload injector systemβ21Updated 3 years ago
- A VS Code extension to preview XML nmap outputβ44Updated 7 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of β¦β48Updated last year
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitationβ46Updated 3 years ago
- An Evil OIDC Serverβ54Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Toolβ25Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talksβ65Updated 3 years ago
- β20Updated 3 years ago
- Collection of my slide decks, conference videos and research white papersβ27Updated last week
- A curated list of argument injection vectorsβ41Updated 8 months ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, anβ¦β144Updated 2 years ago
- A tool for auditing medical devices and healthcare infrastructureβ21Updated 2 years ago
- Tools for offensive security of NetBackup infrastructuresβ40Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped imagesβ30Updated 3 years ago
- an Evil Java RMI Registry.β52Updated 2 years ago
- Tools that trigger False Positive AV alertsβ51Updated 9 months ago
- β33Updated 2 years ago
- β36Updated 5 years ago
- β44Updated 4 years ago
- Vulnerabilities, exploits, and PoCsβ37Updated 4 months ago