shwetankarora / Gsm-Packets-Analysis-FrameworkView external linksLinks
☆20Jun 2, 2016Updated 9 years ago
Alternatives and similar repositories for Gsm-Packets-Analysis-Framework
Users that are interested in Gsm-Packets-Analysis-Framework are comparing it to the libraries listed below
Sorting:
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 5 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Break and Elevation of Privilege the API v2 using JSON Web Token (JWT)☆15Jul 8, 2017Updated 8 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- ☆34Jan 1, 2019Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- Official Dexcalibur documentation☆17May 27, 2021Updated 4 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- A simple tool to find offsets needed in 32bit jailbreaks. Feel free to contribute.☆31Sep 1, 2017Updated 8 years ago
- PoC for leaking text nodes via CSS injection☆35Aug 20, 2018Updated 7 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- MS17-010 multithreading scanner written in python.☆75May 20, 2017Updated 8 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- ☆18Mar 1, 2021Updated 4 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Simple C# reverse shell with shellcode and process injection☆39May 13, 2016Updated 9 years ago