Cryptogenic / MD5-Magic-File-GeneratorLinks
A project in Golang that will create prefix-based magic MD5 hashes for type juggling.
☆20Updated 7 years ago
Alternatives and similar repositories for MD5-Magic-File-Generator
Users that are interested in MD5-Magic-File-Generator are comparing it to the libraries listed below
Sorting:
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- ☆36Updated 6 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Updated 8 years ago
- ☆26Updated 2 months ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- Control Flow Guard Teleportation demo☆23Updated 6 years ago
- ☆14Updated 6 years ago
- ☆101Updated 4 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated this week
- All challenges I created for CTF☆12Updated 4 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 5 months ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆36Updated 7 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- ☆21Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 8 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 8 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- PoC for Foxit Reader CVE-2018-14442☆57Updated 6 years ago