A cheatsheet for exploiting server-side SVG rasterization.
☆30Jul 5, 2022Updated 3 years ago
Alternatives and similar repositories for svg2raster-cheatsheet
Users that are interested in svg2raster-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆76May 9, 2023Updated 2 years ago
- PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication☆36Jul 5, 2022Updated 3 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆13Oct 24, 2024Updated last year
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ManageEngine OpManager Decryption Tools☆32Sep 6, 2022Updated 3 years ago
- Permitta is an intuitive go library, which aims to help handle any kind of permission/access control in a simple and easy to understand w…☆38Jul 22, 2025Updated 8 months ago
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- This repo contains scripts i used while bug bounty.☆16Nov 4, 2020Updated 5 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- C2 Application based GUI with the agent generator.☆13May 12, 2025Updated 10 months ago
- binary ninja cli for agents☆69Mar 27, 2026Updated last week
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- 🗝 BotNet ( .NET ) Source Codes☆14May 2, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 3 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 8 years ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- vhost scanning☆37Nov 1, 2023Updated 2 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- ☆14Feb 12, 2026Updated last month
- Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).☆13Jul 6, 2024Updated last year
- A BurpSuite extension that allows you to use Chromium with PwnFox☆43Dec 23, 2025Updated 3 months ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Mar 26, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Burp Extension for a passive scanning JS files for endpoint links.☆56Nov 20, 2024Updated last year
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- Playing with WPA frequency sessions framworks, check-lists of customs firmware and intensity of RF.☆13Jul 7, 2024Updated last year
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- I am still working on it☆11Apr 30, 2020Updated 5 years ago
- ☆11May 3, 2019Updated 6 years ago
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.☆10Jul 18, 2024Updated last year
- ☆27Jul 18, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Encrypting directory and access. Execute the commands based on external inputs RCE, single-C2 and key-logging.☆11Jul 9, 2024Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- A code highlight plugin,use shiki for better highlight,built for hexo!☆10Oct 13, 2025Updated 5 months ago
- Configuration files of my old Arch Linux+Xmonad based setup☆16Apr 7, 2017Updated 9 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- Simple LSTM language modelling toolkit☆10Oct 21, 2022Updated 3 years ago
- Deep learning model of machine translation using attentional and structural biases☆13Jul 21, 2017Updated 8 years ago