This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter
☆95Dec 16, 2016Updated 9 years ago
Alternatives and similar repositories for ubuntu-apport-exploitation
Users that are interested in ubuntu-apport-exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Contacts Synchronization Private Directory Public Directory City Search Profession Search☆11Oct 21, 2017Updated 8 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Dec 1, 2016Updated 9 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Dec 28, 2016Updated 9 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- ☆18Sep 22, 2017Updated 8 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆244Sep 13, 2021Updated 4 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆172Dec 7, 2016Updated 9 years ago
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- ☆96Jul 10, 2018Updated 7 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Shim to grab keystore backed data☆27Sep 21, 2017Updated 8 years ago
- Repository containing many useful scripts☆75Mar 30, 2022Updated 3 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆190Oct 25, 2017Updated 8 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago