EiNSTeiN- / poodleView external linksLinks
A Proof of Concept for the POODLE vulnerability in SSLv3
☆78Oct 9, 2015Updated 10 years ago
Alternatives and similar repositories for poodle
Users that are interested in poodle are comparing it to the libraries listed below
Sorting:
- PoC implementation of the POODLE attack☆69May 13, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- 微软7月布丁增加 内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- Python requirements.txt parser☆14Feb 13, 2015Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- HMAC timing attack's w/ statistical analysis☆23Sep 19, 2013Updated 12 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Demo Application and Exploit☆35Mar 13, 2017Updated 8 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- ☆23Nov 18, 2015Updated 10 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60May 11, 2015Updated 10 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Jan 24, 2017Updated 9 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Feb 9, 2017Updated 9 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago