Utility for creating ZipSlip archives
☆82Feb 9, 2023Updated 3 years ago
Alternatives and similar repositories for slipit
Users that are interested in slipit are comparing it to the libraries listed below
Sorting:
- This Chromium extensions aims at supporting the analysis of single sign-on implementations, by offering semi-automated analysis and attac…☆29Jul 4, 2023Updated 2 years ago
- ServiceNow widge-simple-list misconfiguration scanner☆65Nov 16, 2023Updated 2 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆64Aug 9, 2023Updated 2 years ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆23Aug 7, 2024Updated last year
- ☆92Aug 23, 2021Updated 4 years ago
- Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.☆59Jan 22, 2023Updated 3 years ago
- jws2pubkey tool☆43Jun 27, 2025Updated 8 months ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Feb 9, 2024Updated 2 years ago
- Proofs-Of-360Security Sandbox Escape☆10Mar 18, 2022Updated 3 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- ☆11Nov 12, 2019Updated 6 years ago
- Extract most frequent words in a list of subdomains☆12Feb 15, 2025Updated last year
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- HITCON 2025 x DEVCORE Wargame☆15Sep 8, 2025Updated 5 months ago
- Wordlists handcrafted (and automated) with ♥☆230Aug 1, 2025Updated 7 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,034Jun 3, 2021Updated 4 years ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Jun 10, 2024Updated last year
- ☆170Oct 4, 2021Updated 4 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆116Feb 18, 2023Updated 3 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆225Feb 6, 2025Updated last year
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- JMX enumeration and attacking tool.☆495Jun 26, 2025Updated 8 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆282Sep 11, 2025Updated 5 months ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- CVE-2022-21587 POC☆15Feb 17, 2023Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Feb 9, 2024Updated 2 years ago
- experimental wildcard subdomain filtering prototype☆16Aug 5, 2023Updated 2 years ago