A Buffer Overflow checklist, with plug-and-play pre-written python scripts.
☆33Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for Buffer-Overflow
Users that are interested in Buffer-Overflow are comparing it to the libraries listed below
Sorting:
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Mar 23, 2022Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆47Oct 3, 2025Updated 4 months ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 7 months ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- ☆14Mar 8, 2023Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- ☆49Mar 25, 2022Updated 3 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- An SSRF detector tool written in golang. I have fixed some errors and added some more payloads to it. But the tool credits go to z0idsec.☆45Feb 10, 2021Updated 5 years ago
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆56Jun 8, 2021Updated 4 years ago
- This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators…☆29Apr 9, 2025Updated 10 months ago
- Complite Web Application Penetration Testing☆27Jul 9, 2021Updated 4 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- ☆29May 8, 2021Updated 4 years ago
- Go library to help with Nitro Attestation☆16May 30, 2025Updated 9 months ago
- ☆22Jul 26, 2021Updated 4 years ago
- Cyber Security Foundations☆35May 30, 2021Updated 4 years ago
- Exploit for the CVE-2024-5806☆45Jun 24, 2024Updated last year
- ☆11May 19, 2022Updated 3 years ago
- Several script and images used with the juice jacking kiosks☆12Jul 21, 2013Updated 12 years ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- Android pin cracker☆13Mar 25, 2022Updated 3 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- Assistant/watchdog for Counterstake Bridge https://counterstake.org☆13Dec 26, 2025Updated 2 months ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Beta release☆184Oct 8, 2021Updated 4 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- Abstractions for iterating and mapping over struct fields☆17Jan 15, 2026Updated last month
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- ☆10Mar 11, 2017Updated 8 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- ☆12Feb 20, 2025Updated last year
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Example Optimized Gas ERC721 Minting Contract☆11Dec 28, 2021Updated 4 years ago