Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.
☆71Dec 5, 2014Updated 11 years ago
Alternatives and similar repositories for FSExploitMe
Users that are interested in FSExploitMe are comparing it to the libraries listed below
Sorting:
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 11 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- PS Vita Webkit Exploit / Mini SDK and Testing Framework☆34Nov 6, 2014Updated 11 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Runtime code injection suite for exploring OS X process security☆40Jun 1, 2009Updated 16 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Injection of managed code into non-managed Windows applications☆28Jan 17, 2019Updated 7 years ago
- ☆25Sep 28, 2020Updated 5 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 3 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- ☆13Jun 25, 2016Updated 9 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Xanity PHP RAT leak For Researchers☆21Dec 3, 2015Updated 10 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 7 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- ☆34Nov 1, 2014Updated 11 years ago
- Stolen WiFi Aggregate Tunneling Protocol Dæmon (RAID your internet connections!)☆18Jun 16, 2012Updated 13 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- ☆19Jun 29, 2012Updated 13 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- iSEC Partners' research publications☆76Jul 8, 2016Updated 9 years ago