Ganapati / spafLinks
Static Php Analysis and Fuzzer
☆26Updated 11 years ago
Alternatives and similar repositories for spaf
Users that are interested in spaf are comparing it to the libraries listed below
Sorting:
- FWRF is a open source tool for firmware web-side analysis.☆11Updated 10 years ago
- A Modern Approach☆10Updated 10 years ago
- Firmware analysis website + API☆43Updated 5 years ago
- Format string exploit generation☆10Updated 10 years ago
- CTF exploit development and other tools of pwnage☆19Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- A fuzzing script for MitmProxy☆24Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 10 years ago
- CVE-2016-3141☆15Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 8 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆28Updated 4 years ago
- ☆43Updated 7 years ago
- Peach Fuzzer Web Frontend☆51Updated 4 years ago
- Application Security library☆11Updated 13 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- ☆43Updated 7 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 8 months ago