CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing
☆89Oct 31, 2023Updated 2 years ago
Alternatives and similar repositories for RIUS
Users that are interested in RIUS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- frida snippet generator firefox extension for developer.android.com☆23Mar 2, 2022Updated 4 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 3 months ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆253Mar 7, 2022Updated 4 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 3 months ago
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆184Apr 3, 2022Updated 3 years ago
- ☆30Mar 7, 2022Updated 4 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- CVE-2022-30190 | MS-MSDT Follina One Click☆20Jun 3, 2022Updated 3 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- A binary hardening system☆111Sep 30, 2023Updated 2 years ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.☆218Apr 26, 2022Updated 3 years ago
- CVE-2022-22639: Get a Root Shell on macOS Monterey☆122Apr 5, 2022Updated 3 years ago
- Breaking secure checksums in the scudo heap allocator☆13Apr 9, 2020Updated 5 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Enabled Web Inspector for all iOS apps☆53Jun 10, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆101Apr 7, 2022Updated 3 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆605Mar 19, 2022Updated 4 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 12 years ago
- ☆10Mar 29, 2022Updated 3 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆306Feb 26, 2022Updated 4 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆24Jan 1, 2021Updated 5 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Apr 10, 2022Updated 3 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Jun 16, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- ☆12May 31, 2022Updated 3 years ago