Lists (1)
Sort Name ascending (A-Z)
Stars
VulnStudio – Comprehensive Vulnerability Report Generation Tool
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
Simple reverse shell to avoid Win 11 defender detection
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Reverse shell generator for HackTheBox written in 🖤#/bin/bash
object serialization. ... “Pickling” is the process whereby a Python object hierarchy is converted into a byte stream, and “unpickling” is the inverse operation, whereby a byte stream is converted …
In cryptography, RC4 is a stream cipher. While remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure.
OAuth is an authorization framework that enables applications to obtain limited access to user accounts on an service, such as Facebook, GitHub, ect..
Cross-Site Request Forgery (CSRF) is a type of attack that occurs when a malicious web site, email, blog, instant message, or program causes a user's web browser to perform an unwanted action on a …