0xor0ne / flipperbitLinks
Corrupted files generator. Random bits flipper.
☆25Updated last year
Alternatives and similar repositories for flipperbit
Users that are interested in flipperbit are comparing it to the libraries listed below
Sorting:
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- A MBR Fuzzer☆29Updated last year
- A collection of beautified and commented samples of malware implemented in Bash☆14Updated 2 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 7 months ago
- Read only mirror - No pull requests☆19Updated 4 years ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆35Updated 7 months ago
- Simple CVE-2021-20294 poc☆11Updated 2 years ago
- zyxel_ipc_camera_pwn☆20Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated 2 years ago
- ☆25Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- ☆7Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- BINARLY Research Tools and PoCs☆36Updated 9 months ago
- Simple WebSocket fuzzer☆33Updated 2 years ago
- ☆12Updated 4 years ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆46Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- ☆65Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 6 months ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Simple and efficient file shredding☆14Updated 5 years ago
- ☆19Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 5 months ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- ☆57Updated 5 years ago