☆18Jul 22, 2023Updated 2 years ago
Alternatives and similar repositories for DeReviewer
Users that are interested in DeReviewer are comparing it to the libraries listed below
Sorting:
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- Some of my public exploits☆52Sep 15, 2020Updated 5 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Small C# caching and cache-filling library, intended as a replacement for memcached in many cases.☆14Apr 28, 2025Updated 10 months ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- ☆19Sep 15, 2021Updated 4 years ago
- Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.☆32May 8, 2020Updated 5 years ago
- ☆21Sep 12, 2025Updated 6 months ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Microsoft C++ Headers and Libraries☆11Oct 15, 2020Updated 5 years ago
- DID based SIOP☆11Jan 1, 2023Updated 3 years ago
- ☆12Jul 27, 2020Updated 5 years ago
- CVE-2020-3992 & CVE-2019-5544☆68Feb 5, 2021Updated 5 years ago
- ☆10Jun 2, 2021Updated 4 years ago
- ☆22Jan 26, 2015Updated 11 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Apr 13, 2019Updated 6 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface cre…☆13Mar 15, 2022Updated 4 years ago
- Using Google translate as WebProxy☆13May 22, 2023Updated 2 years ago
- Inlay hints for hex-rays☆81Jan 17, 2026Updated 2 months ago
- This script is used to get the Windows NT-Hash.☆14Feb 6, 2021Updated 5 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Jan 29, 2021Updated 5 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- A python Flask app that generates dynamic DTDs for easy out-of-band data exfiltration.☆29Nov 2, 2022Updated 3 years ago
- ☆10Aug 18, 2021Updated 4 years ago
- This is the companion repository of https://superkotlin.com/kotlin-mega-tutorial/☆10Aug 6, 2018Updated 7 years ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- ☆22Mar 5, 2026Updated 2 weeks ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- OAuth plugin for Burp Suite Extender☆43Jun 27, 2018Updated 7 years ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆19Mar 27, 2023Updated 2 years ago
- CVE-2020-10204 远程命令执行脚本☆13May 27, 2020Updated 5 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 7 years ago
- CANAPE Network Testing Tool☆34Sep 25, 2018Updated 7 years ago
- Vulnerable application for security issues demo☆17Jan 18, 2019Updated 7 years ago
- SPI MITM for the Arty S7-50☆14Dec 24, 2022Updated 3 years ago
- Материалы и задания по курсу "Программирование с зависимыми типами" 2018 года☆15Dec 17, 2018Updated 7 years ago