Snowflake is a tool for exploiting randomness vulnerabilities by seed recovery attacks targetting the rand() and mt_rand() generators in PHP applications.
☆83Aug 1, 2017Updated 8 years ago
Alternatives and similar repositories for Snowflake
Users that are interested in Snowflake are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Php Codz Hacking☆21Sep 5, 2015Updated 10 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- PHP obfuscator written in Javascript.☆14Oct 8, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- jenkins payload☆17May 3, 2017Updated 8 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- A PoC hash complexity DoS against PHP☆22Oct 1, 2015Updated 10 years ago
- LLVM DSA fork for SeaHorn☆21Aug 17, 2019Updated 6 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- An online IRC system based on Web.py~☆20Mar 27, 2015Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆17Aug 4, 2014Updated 11 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 11 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Jan 22, 2016Updated 10 years ago
- An Android port of the melkor ELF fuzzer☆64Aug 21, 2014Updated 11 years ago
- ☆78Oct 28, 2015Updated 10 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆48Mar 20, 2013Updated 13 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tools, documentation and test inputs for fuzzing opensource projects with AddressSanitizer and friends.☆29Sep 24, 2015Updated 10 years ago
- GDB fork targetting Android/Fennec development☆35May 12, 2014Updated 11 years ago
- AggressorScript-RunDumpHash☆19Oct 9, 2019Updated 6 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Alternative hexdump.☆15Feb 4, 2016Updated 10 years ago
- A function invocation framework for Python☆11Feb 21, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- http://x0day.me/archives/bannerscan-py.html☆53Sep 4, 2014Updated 11 years ago
- My Python WorkSpace☆11Mar 30, 2018Updated 8 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago