A tool for mapping cypher databases
☆16Jan 20, 2026Updated last month
Alternatives and similar repositories for cyphermap
Users that are interested in cyphermap are comparing it to the libraries listed below
Sorting:
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- Spring Cloud Function Vulnerable Application / CVE-2022-22963☆19Apr 1, 2022Updated 3 years ago
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆17Jun 22, 2025Updated 8 months ago
- GameOver(lay) Ubuntu Privilege Escalation☆132Oct 9, 2023Updated 2 years ago
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Dec 8, 2022Updated 3 years ago
- ☆10Feb 20, 2017Updated 9 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- 递归寻找JS泄露的路径。Recursively search for the paths of JS Files.For pentest☆11Sep 30, 2024Updated last year
- This is a article that will teach you the basics of the go programming language in coordination to the article im doing on robust and sec…☆10Aug 15, 2022Updated 3 years ago
- host碰撞工具☆13May 22, 2023Updated 2 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- A tool for creating proxy dll for hijacking☆42Oct 28, 2024Updated last year
- 123123☆16Dec 31, 2025Updated last month
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Generate a unique ID, à la PHP☆13Mar 4, 2021Updated 4 years ago
- Shellcode loader with evasion capabilities written in Nim☆14Jan 25, 2025Updated last year
- eeecdn检测是否存在cdn,输出整理真实c段☆14Feb 25, 2025Updated last year
- Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerabili…☆11May 14, 2023Updated 2 years ago
- Gemini4IDA: Gemini for IDA disassembly and program analysis☆13Dec 29, 2023Updated 2 years ago
- Golang lib to interact with aircrack-ng (ABANDONNED)☆12Jul 12, 2019Updated 6 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- ☆59Nov 13, 2024Updated last year
- r3conwhale aims to develop a multifunctional recon chain for web applications, intelligently interpreting collected data, and optimizing …☆14Jul 3, 2024Updated last year
- tests to catch some sloppy hv impls☆32Dec 17, 2025Updated 2 months ago
- ldid and ldid2☆14Jun 25, 2018Updated 7 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- Detect and alert when Rogue AP and Deauth attacks occur☆14May 16, 2019Updated 6 years ago
- shellcode loader☆29Jul 23, 2025Updated 7 months ago
- ☆13Oct 27, 2022Updated 3 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago
- Precompiled executable☆63Feb 21, 2025Updated last year
- Various math art notebooks☆15Mar 9, 2025Updated 11 months ago
- ☆11Apr 27, 2022Updated 3 years ago
- HITB SECCONF CTF 2023. Developed with ❤️ by Hackerdom team and HITB.☆16Sep 6, 2023Updated 2 years ago
- ☆13Jul 22, 2023Updated 2 years ago