Gnoxter / mountain_goatView external linksLinks
A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous
☆40Aug 23, 2016Updated 9 years ago
Alternatives and similar repositories for mountain_goat
Users that are interested in mountain_goat are comparing it to the libraries listed below
Sorting:
- ☆38Jul 4, 2016Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆75Aug 30, 2016Updated 9 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- ☆47Aug 7, 2019Updated 6 years ago
- XXE OOB Exploitation Toolset for Automation☆63Jan 20, 2014Updated 12 years ago
- ☆23Sep 21, 2014Updated 11 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- Telegram bot for assembling and disassembling on-the-go.☆21Sep 20, 2022Updated 3 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- A site to easily decode the content of Rails sessions stored in cookies.☆16Jan 26, 2014Updated 12 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- IMF4-Binary☆12Oct 19, 2018Updated 7 years ago
- A taster of TTWE☆18Sep 1, 2014Updated 11 years ago
- 2018 TenDollar CTF☆30Dec 5, 2018Updated 7 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Handy WMI query tool.☆12Jun 20, 2016Updated 9 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Jan 10, 2016Updated 10 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- A simple web based tool for working with assembly / disassembly☆89Feb 3, 2026Updated 2 weeks ago
- Experimental Java agent to stomp on things.☆15Feb 10, 2019Updated 7 years ago
- Automatically exported from code.google.com/p/checkout4mac☆13Oct 24, 2016Updated 9 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 9 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Cross Architecture Shellcode in C☆208Aug 24, 2016Updated 9 years ago
- ☆100Nov 5, 2021Updated 4 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago