☆18Jul 22, 2023Updated 2 years ago
Alternatives and similar repositories for DeReviewer
Users that are interested in DeReviewer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- Some of my public exploits☆53Sep 15, 2020Updated 5 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Security Research☆35Dec 23, 2021Updated 4 years ago
- This is a Frida/Gui tool is used for dynamic analysis of android applications. The tool allows you to inject/hook javascript to various …☆23Sep 19, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆19Sep 15, 2021Updated 4 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- ☆21Sep 12, 2025Updated 8 months ago
- Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.☆31May 8, 2020Updated 6 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Microsoft C++ Headers and Libraries☆15Oct 15, 2020Updated 5 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆92Oct 14, 2014Updated 11 years ago
- ☆12Jul 27, 2020Updated 5 years ago
- CVE-2020-3992 & CVE-2019-5544☆67Feb 5, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆18Oct 2, 2018Updated 7 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- ☆22Jan 26, 2015Updated 11 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Apr 13, 2019Updated 7 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface cre…☆13Mar 15, 2022Updated 4 years ago
- Using Google translate as WebProxy☆13May 22, 2023Updated 2 years ago
- A fast generative fuzzer for HTTP☆17Nov 29, 2018Updated 7 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆10Aug 18, 2021Updated 4 years ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- A DisplayCAL/ArgyllCMS/Spyder4-calibrated ICC profile for the Lenovo ThinkPad X280 internal LCD.☆11Oct 20, 2019Updated 6 years ago
- OAuth plugin for Burp Suite Extender☆43Jun 27, 2018Updated 7 years ago
- ☆13Apr 11, 2020Updated 6 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Mar 30, 2018Updated 8 years ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆20Mar 27, 2023Updated 3 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 7 years ago
- CANAPE Network Testing Tool☆34Sep 25, 2018Updated 7 years ago
- SPI MITM for the Arty S7-50☆14Dec 24, 2022Updated 3 years ago
- JMX enumeration and attacking tool.☆504Jun 26, 2025Updated 10 months ago
- Reading list of more resources to learn about Adversarial Attacks on AI Systems☆39Apr 7, 2026Updated last month
- Example Vulnerable .NET HTTP Remoting☆88Mar 26, 2019Updated 7 years ago