A cheatsheet for exploiting server-side SVG rasterization.
☆30Jul 5, 2022Updated 3 years ago
Alternatives and similar repositories for svg2raster-cheatsheet
Users that are interested in svg2raster-cheatsheet are comparing it to the libraries listed below
Sorting:
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆13Oct 24, 2024Updated last year
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- A list of threat sinks used in the manual security source code review for application security☆76May 9, 2023Updated 2 years ago
- ☆22Feb 4, 2017Updated 9 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- ☆29May 30, 2024Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆33Dec 12, 2025Updated 3 months ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- CVE-2021-21972☆33Mar 1, 2021Updated 5 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- vhost scanning☆37Nov 1, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 11 months ago
- darknet crawler to map links☆10Apr 15, 2020Updated 5 years ago
- My CTF challenges (2018~)☆28Sep 17, 2023Updated 2 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- black Ip lists, dorks-collection☆16Mar 1, 2026Updated last week
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- aarch64 Malware course☆11Nov 13, 2025Updated 4 months ago
- 🤗 Transformers: State-of-the-art Machine Learning for Pytorch, TensorFlow, and JAX.☆11Nov 19, 2024Updated last year
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- declarative flag parsing for Go using struct tags☆12May 7, 2023Updated 2 years ago
- Challenges I wrote for various CTF competitions☆44Jul 21, 2024Updated last year
- 一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webs…☆12Dec 18, 2023Updated 2 years ago
- ☆10Feb 20, 2026Updated 3 weeks ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Simple smtp server in go☆11Jul 17, 2017Updated 8 years ago
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 11 months ago
- ☆14Jan 2, 2026Updated 2 months ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated last month
- PostScript examples useful for attacking Ghostscript.☆12Aug 1, 2024Updated last year
- 📝 My Bug Bounty Writeups☆10Nov 16, 2025Updated 3 months ago