We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)
☆35Apr 18, 2013Updated 12 years ago
Alternatives and similar repositories for BufferOverflow-Kit
Users that are interested in BufferOverflow-Kit are comparing it to the libraries listed below
Sorting:
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- ☆23Jan 22, 2017Updated 9 years ago
- Simple golang reverse shell☆20Jan 22, 2020Updated 6 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆74Dec 9, 2019Updated 6 years ago
- UPX - the Ultimate Packer for eXecutables☆14Feb 28, 2017Updated 9 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- XXE OOB Exploitation Toolset for Automation☆63Jan 20, 2014Updated 12 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Network traffic sensor☆115Jun 8, 2022Updated 3 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Apr 3, 2016Updated 9 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- Scans tcl for command injection☆17Mar 8, 2020Updated 6 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- ☆21Dec 20, 2012Updated 13 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- Web recon tool (find temporary files, parse robots.txt, search some folders, google dorks and search domains hosted on same server)☆105Nov 22, 2016Updated 9 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago