We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)
☆35Apr 18, 2013Updated 12 years ago
Alternatives and similar repositories for BufferOverflow-Kit
Users that are interested in BufferOverflow-Kit are comparing it to the libraries listed below
Sorting:
- ☆18Jun 26, 2017Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Scans tcl for command injection☆17Mar 8, 2020Updated 5 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Web recon tool (find temporary files, parse robots.txt, search some folders, google dorks and search domains hosted on same server)☆105Nov 22, 2016Updated 9 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- GDB commands to aid exploit development☆46Sep 9, 2016Updated 9 years ago
- A PE Header-Based Antivirus Tool☆11Nov 14, 2014Updated 11 years ago
- UPX - the Ultimate Packer for eXecutables☆14Feb 28, 2017Updated 9 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- fsfuzzer mirror☆13May 8, 2017Updated 8 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Network traffic sensor☆115Jun 8, 2022Updated 3 years ago
- A standalone PHP backdoor for use on *nix and Windows systems.☆50Sep 24, 2016Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆32Jul 18, 2017Updated 8 years ago
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- weblogic T3 collections java InvokerTransformer Transformer InvokerTransformer weblogic.jndi.WLInitialContextFactory☆14Feb 27, 2018Updated 8 years ago