Gallopsled / pwncryptoLinks
☆20Updated 11 years ago
Alternatives and similar repositories for pwncrypto
Users that are interested in pwncrypto are comparing it to the libraries listed below
Sorting:
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Format string exploit generation☆10Updated 9 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- ☆11Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- ☆14Updated 5 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 6 years ago
- All challenges I created for CTF☆12Updated 4 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 6 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago