☆14Apr 28, 2016Updated 9 years ago
Alternatives and similar repositories for Insomnihack-2016
Users that are interested in Insomnihack-2016 are comparing it to the libraries listed below
Sorting:
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Aug 2, 2016Updated 9 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- ☆28Jan 27, 2017Updated 9 years ago
- ☆28Mar 22, 2013Updated 12 years ago
- ☆24Dec 6, 2015Updated 10 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Dec 31, 2016Updated 9 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Aug 5, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- 使用verilog编写sdram控制器☆12Jun 22, 2019Updated 6 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Issue with NSCollectionView's default drag and drop implementation☆12May 3, 2018Updated 7 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Portable C Compiler (CVS mirror)☆12Apr 9, 2012Updated 13 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- A 10Gbps UDP Reverse Proxy for Realtime Processing☆10Oct 29, 2013Updated 12 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- Turn your Raspberry Pi into router☆26Mar 29, 2014Updated 11 years ago
- SMS4 Decrypt☆11Dec 23, 2020Updated 5 years ago
- Whale FM archive, data☆16Mar 4, 2015Updated 11 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Aug 12, 2015Updated 10 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Examples of programs written in several languages☆11Apr 18, 2023Updated 2 years ago
- A set of tools to work with cgroup tree and process classification/QoS according to it☆10Oct 1, 2019Updated 6 years ago
- A kernel module that lists all current tasks in a Linux system☆15Dec 13, 2015Updated 10 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- CDB-PIg is a plugin for cdb, but not windbg.☆11Nov 29, 2018Updated 7 years ago
- ☆10Jun 2, 2020Updated 5 years ago