0dayCTF
Pentester / Child Safety Warrior / Serial Entrepreneur -- Check me out on https://tryhackme.com/p/0day
https://pentester.com
0dayCTF's Stars
RobinLinus/snapdrop
A Progressive Web App for local file sharing
streaak/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
dwisiswant0/apkleaks
Scanning APK file for URIs, endpoints & secrets.
ParisNeo/lollms-webui
Lord of Large Language Models Web User Interface
ckolivas/cgminer
ASIC and FPGA miner in c for bitcoin
juncongmoo/pyllama
LLaMA: Open and Efficient Foundation Language Models
christophetd/CloudFlair
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
NetSPI/PowerUpSQL
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
ajinabraham/nodejsscan
nodejsscan is a static security code scanner for Node.js applications.
xnl-h4ck3r/waymore
Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan & VirusTotal!
MatthewKuKanich/FindMyFlipper
The FindMy Flipper app turns your FlipperZero into an AirTag or other tracking device, compatible with Apple AirTags and Samsung SmartTag and Tile Trackers. It uses the BLE beacon to broadcast, allowing users to clone existing tags, generate OpenHaystack key pairs for Apple's FindMy network, and customize beacon intervals and transmit power.
lkarlslund/ldapnomnom
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
eladshamir/Whisker
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow Credentials" to the target account.
BishopFox/h2csmuggler
HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
ShutdownRepo/pywhisker
Python version of the C# tool for "Shadow Credentials" attacks
teamssix/container-escape-check
docker container escape check || Docker 容器逃逸检测
kleiton0x00/ppmap
A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.
zgzhang/cve-2024-6387-poc
a signal handler race condition in OpenSSH's server (sshd)
dnakov/r2d2
🤖🏴☠️ radare2 plugin for GPT-4 🦜. Solve crackmes automatically 🪄
glebarez/padre
Blazing fast, advanced Padding Oracle exploit
Jpinsoft/DeepSound
Official DeepSound repository migrated from jpinsoft.net. DeepSound is a freeware steganography tool and audio converter that hides secret data into audio files. The application also enables you to extract secret files directly from audio files or audio CD tracks.
fafalone/RunAsTrustedInstaller
Run a program as TrustedInstaller (SYSTEM)
Sn1r/Nim-Reverse-Shell
A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse shell connection with a target system. Use responsibly for educational purposes only.
C4l1b4n/NoSQL-Attack-Suite
A couple of different scripts, made to automate attacks against NoSQL databases.
0dayCTF/Autofill_Danger
Autofill Phishing
FourCoreLabs/TrustedInstallerPOC
A simple go Proof of Concept to start a new shell as TrustedInstaller
CMNatic/CVE-2024-21413
CVE-2024-21413 PoC for THM Lab
0dayCTF/endlets
Bookmarklet to find endpoints easily with one click
K3ysTr0K3R/CVE-2024-25600-EXPLOIT
A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)
pentestfunctions/tryhackme_progress
Analyze your tryhackme progress!