A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.
☆137Dec 23, 2025Updated 2 months ago
Alternatives and similar repositories for laravel-crypto-killer
Users that are interested in laravel-crypto-killer are comparing it to the libraries listed below
Sorting:
- lightyear is a tool to dump files in tedious (blind) conditions using PHP filters☆112Jun 23, 2025Updated 8 months ago
- ☆11Dec 19, 2024Updated last year
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Nov 2, 2025Updated 4 months ago
- ANY.RUN sandbox detection collection☆22Aug 21, 2024Updated last year
- Web File Manager☆11Aug 21, 2025Updated 6 months ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- ☆13Jun 27, 2023Updated 2 years ago
- Remote administration toolkit for windows, based on Hidden VNC: file manager, keystroke logger, powershell☆38Nov 23, 2025Updated 3 months ago
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆325Jun 2, 2024Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- ☆93Dec 15, 2025Updated 2 months ago
- Gopher Tomcat Deployer☆48Nov 12, 2018Updated 7 years ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 4 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆63Jun 27, 2025Updated 8 months ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆60Aug 21, 2024Updated last year
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated 11 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 8 months ago
- Easily create and share Proof of Concepts in HTML, JavaScript, etc. with custom headers, all via query parameters☆13Oct 1, 2025Updated 5 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆35Jan 18, 2026Updated last month
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- A fast WordPress plugin enumeration tool☆786Updated this week
- Bash and ZSH integration for Impacket☆72Nov 6, 2025Updated 4 months ago
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated last week
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- 在线安软识别☆12Aug 6, 2025Updated 7 months ago
- ☆17May 22, 2024Updated last year
- A cross platform library to write offensive and defensive security tools in Go☆131Dec 28, 2025Updated 2 months ago
- A REALLY Danger Windows Driver, Turn Any threads Ring0!☆13Aug 11, 2025Updated 6 months ago
- ☆16Feb 27, 2026Updated last week
- ☆10Jun 29, 2022Updated 3 years ago
- ☆12Nov 25, 2024Updated last year
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated last month
- ☆14Sep 1, 2024Updated last year
- rcat☆74Mar 7, 2022Updated 4 years ago
- .NET deserialization hunter☆86Jul 21, 2024Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- ☆13Jan 22, 2025Updated last year