Tools to work with vulnerability standards.
☆19Mar 19, 2014Updated 11 years ago
Alternatives and similar repositories for vuln_tools
Users that are interested in vuln_tools are comparing it to the libraries listed below
Sorting:
- ☆13Jun 25, 2016Updated 9 years ago
- ☆27May 29, 2015Updated 10 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- A collection of hex utilities in python☆14Mar 1, 2013Updated 13 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Aug 31, 2012Updated 13 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Open source tool that uses censys and shodan for passive recon.☆13May 20, 2016Updated 9 years ago
- Generic server for collaborative code analysis☆13Dec 19, 2016Updated 9 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18May 14, 2020Updated 5 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Jan 4, 2016Updated 10 years ago
- Fuzz testing framework for security research☆30Jun 19, 2014Updated 11 years ago
- xosVer Get remote host os version info☆14Aug 20, 2015Updated 10 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago