rumputliar's repositories

Language:ShellStargazers:1Issues:2Issues:0

agartha

a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to spot authentication/authorization issues, and converts Http requests to Javascript for further XSS exploitation and more.

Language:PythonStargazers:0Issues:1Issues:0

aleph

Search and browse documents and data; find the people and companies you look for.

Language:JavaScriptLicense:MITStargazers:0Issues:1Issues:0
Language:PythonLicense:GPL-3.0Stargazers:0Issues:2Issues:0

awesome-hacker-search-engines

A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more

Stargazers:0Issues:0Issues:0
License:MITStargazers:0Issues:2Issues:0
Language:PythonLicense:GPL-3.0Stargazers:0Issues:1Issues:0

Excel-Exploit

Original Code

Stargazers:0Issues:1Issues:0

FavFreak

Making Favicon.ico based Recon Great again !

Language:PythonLicense:MITStargazers:0Issues:0Issues:0
Language:PythonStargazers:0Issues:2Issues:0
Language:GoLicense:Apache-2.0Stargazers:0Issues:2Issues:0
Language:PythonStargazers:0Issues:2Issues:0

JPGtoMalware

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

License:NOASSERTIONStargazers:0Issues:0Issues:0

linux-exploit-suggester

Linux privilege escalation auditing tool

Language:ShellLicense:GPL-3.0Stargazers:0Issues:1Issues:0
License:AGPL-3.0Stargazers:0Issues:0Issues:0

retire.js

scanner detecting the use of JavaScript libraries with known vulnerabilities

License:NOASSERTIONStargazers:0Issues:0Issues:0
Language:ShellStargazers:0Issues:2Issues:0
Language:PHPStargazers:0Issues:2Issues:0
Language:PythonLicense:MITStargazers:0Issues:2Issues:0
Language:PythonLicense:MITStargazers:0Issues:2Issues:0

stable-diffusion-webui

Stable Diffusion web UI

License:AGPL-3.0Stargazers:0Issues:0Issues:0
Language:PHPStargazers:0Issues:2Issues:0

Unix-Privilege-Escalation-Exploits-Pack

Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.

Language:CStargazers:0Issues:0Issues:0
Language:PHPLicense:MITStargazers:0Issues:2Issues:0
Language:PHPStargazers:0Issues:2Issues:0

xnLinkFinder

A python tool used to discover endpoints for a given target

Stargazers:0Issues:0Issues:0
Language:PHPStargazers:0Issues:2Issues:0
License:MITStargazers:0Issues:2Issues:0