details about DIAL protocol vulnerabilities
☆29Nov 24, 2023Updated 2 years ago
Alternatives and similar repositories for DIALStranger
Users that are interested in DIALStranger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- ☆26Jan 7, 2024Updated 2 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- GTK+ interface for classic Uniden scanners☆10Jul 21, 2021Updated 4 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Dec 8, 2023Updated 2 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 10 months ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆83May 9, 2024Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 3 months ago
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically fuzz Rust projects from scratch☆59Jul 8, 2025Updated 8 months ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 11 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- ☆19Nov 26, 2024Updated last year
- Integer overflow in FreeType software, which also affects Chrome☆29Aug 27, 2025Updated 6 months ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- Simple security lookups via CLI☆16Jan 29, 2025Updated last year
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 5 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- ☆28Mar 14, 2026Updated last week
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 9 months ago
- ☆13Nov 24, 2021Updated 4 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Feb 25, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆38Jan 6, 2025Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 4 months ago
- List of Awesome Red Teaming Resources☆13Sep 2, 2021Updated 4 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year
- ☆115Jan 8, 2025Updated last year
- Hardened your Windows OS against forensics analysis☆25Nov 27, 2024Updated last year