Code fragmentation technique for scripting languages
☆18Jan 11, 2021Updated 5 years ago
Alternatives and similar repositories for php-omelette
Users that are interested in php-omelette are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- A Github Repository Created to compliment a BSides Canberra 2018 talk on SharePoint Security.☆49Apr 15, 2018Updated 7 years ago
- A rewrite of the popular altDNS subdomain tool by @infosec-au☆12Feb 28, 2019Updated 7 years ago
- #HackingTogether☆14Jan 23, 2017Updated 9 years ago
- Another radare2 gui for windows☆39Feb 22, 2017Updated 9 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- ☆12Oct 10, 2024Updated last year
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- mdbook preprocessor for generating checklists and indexes☆14Nov 29, 2022Updated 3 years ago
- Jupiter Brain manages servers☆14Mar 29, 2019Updated 6 years ago
- ☆15May 17, 2018Updated 7 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated 11 months ago
- Syntax highlighting the Perl debugger☆33Nov 21, 2015Updated 10 years ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- Checks if files is accessible based on the source code.☆16Mar 13, 2024Updated 2 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- ☆23Mar 11, 2014Updated 12 years ago
- ☆12Aug 8, 2024Updated last year
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 2 years ago
- Emulates the puu.sh api to allow uploading of images to your own server☆25Feb 9, 2012Updated 14 years ago
- service location protocol amplified denial of service attack verification tool☆16Apr 25, 2023Updated 2 years ago
- Surgical python tool to assist in LFI discovery☆13Sep 2, 2018Updated 7 years ago
- Expand CIDR ranges to IPv4 addresses☆13Jul 28, 2022Updated 3 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 7 years ago
- Hooking & Executing Code with dlopen & dlsym ---Easy mode:hooking C methods☆11Oct 23, 2017Updated 8 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- ☆15Feb 22, 2021Updated 5 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆87Sep 26, 2016Updated 9 years ago
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆15Jan 11, 2020Updated 6 years ago
- CardStalker provides a UART-driven smartcard reader at the T=1 (see ISO7816-3) level (link and physical layer), where most of the smartca…☆21May 1, 2022Updated 3 years ago