Skip to content
View cr1f's full-sized avatar

Block or report cr1f

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and conducting tests.

Python 41 5 Updated Aug 23, 2024

Neo-reGeorg is a project that seeks to aggressively refactor reGeorg

Python 3,341 473 Updated Mar 11, 2026

SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.

Go 21,025 1,359 Updated Nov 5, 2025

rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks

JavaScript 1,561 184 Updated Jan 16, 2026

Complete list of LPE exploits for Windows (starting from 2023)

C 922 130 Updated Apr 11, 2026

A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.

JavaScript 787 85 Updated Dec 9, 2025

A collection of Server-Side Prototype Pollution gadgets and exploits

JavaScript 229 20 Updated Feb 6, 2025

Example of passing file descriptors into a container to perform a privilege escalation on the host

C 24 4 Updated Jul 3, 2020

AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.

Java 28 2 Updated Apr 30, 2025

Dev podkop

JavaScript 1,610 135 Updated Mar 7, 2026

Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

XSLT 8,443 1,124 Updated Mar 16, 2026

Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2

Shell 27,601 6,508 Updated Apr 13, 2026

a rep for documenting my study, may be from 0 to 0.1

Java 2,264 339 Updated Mar 25, 2026

su18 ysoserial

Java 17 8 Updated May 4, 2023

Simple and accurate guide for linux privilege escalation tactics

289 42 Updated Dec 11, 2023

MySQL fake server for read files of connected clients

Python 605 149 Updated Jul 23, 2017

A collection of statically compiled tools like Nmap and Socat.

Shell 481 117 Updated Mar 22, 2024

Exploits targeting Symfony

Python 214 50 Updated Sep 19, 2024

The first standalone .NET decompiler for Mac, Linux and Windows

C# 380 36 Updated Nov 18, 2024

An MS Sharepoint and Frontpage Auditing Tool

Python 57 15 Updated Nov 18, 2024

Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing

Python 32 2 Updated Jun 6, 2024

Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys

Python 660 88 Updated Feb 1, 2025

A library for detecting known secrets across many web frameworks

Python 794 79 Updated Apr 8, 2026

Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()

Python 505 61 Updated Sep 30, 2024

Generate a PNG with a payload embedded in the IDAT chunk (Based off of previous concepts and code -- credit in README)

Python 215 53 Updated Sep 19, 2025

Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.

Python 239 12 Updated Oct 8, 2024

Extract URLs, paths, secrets, and other interesting bits from JavaScript

Go 1,811 137 Updated May 22, 2024

The recursive internet scanner for hackers. 🧡

Python 9,601 794 Updated Apr 12, 2026

Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.

Python 733 119 Updated Jan 16, 2024

The most exhaustive list of reliable DNS resolvers.

979 107 Updated Apr 12, 2026
Next