NoiSeBit / Podcasts
нерегулярный подкаст о жизни ресечеров по обе стороны океана
☆34Updated 6 years ago
Alternatives and similar repositories for Podcasts:
Users that are interested in Podcasts are comparing it to the libraries listed below
- Vulnerability research and development.☆25Updated 9 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 9 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Updated 9 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- ☆9Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- ☆9Updated 9 years ago
- ☆15Updated 4 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆14Updated 7 years ago
- ☆22Updated 7 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆60Updated 9 years ago
- Asynchronous HTTP pipelining directory buster☆22Updated 4 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 8 years ago
- CTF writeups☆13Updated 7 years ago
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 9 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- Small DNS Recon utility, allows you to obtain some useful info about NS-servers placed behind relays, firewalls, etc.☆22Updated 7 years ago
- ☆15Updated 2 years ago
- Fuzzer☆43Updated 10 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Mutates and generates files with all possible combinations of fuzzed bytes in the file.☆10Updated 6 years ago
- ☆19Updated 10 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago