KINGSABRI / BufferOverflow-KitLinks
We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)
☆34Updated 12 years ago
Alternatives and similar repositories for BufferOverflow-Kit
Users that are interested in BufferOverflow-Kit are comparing it to the libraries listed below
Sorting:
- ☆86Updated 10 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- A shellcode testing harness.☆70Updated last year
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- Projects and POCs☆60Updated 11 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- My own tools for easing the task of pentesting / exploit writing☆50Updated 10 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- unix wildcard attacks☆136Updated 7 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago