Pr0x13 / CVE-2014-4377Links
☆14Updated 10 years ago
Alternatives and similar repositories for CVE-2014-4377
Users that are interested in CVE-2014-4377 are comparing it to the libraries listed below
Sorting:
- various exploits☆31Updated 13 years ago
- ☆12Updated 11 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Password cracking utility☆53Updated 4 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 8 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- MiTM tools and scripts☆19Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Proof of Concepts, Exploits☆28Updated 5 months ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Decrypts local iOS backups and recreates file system, with a framework for automatically extracting useful information☆43Updated 10 years ago
- Hacking environment installation scripts for OS X☆28Updated 3 years ago
- Wireless discovery and exploitation framework written in Python☆18Updated 14 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- Materials from presentation☆20Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆19Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 12 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- ☆72Updated 10 years ago
- Infecting PE☆24Updated 11 years ago
- Network white noise collector☆19Updated 9 years ago
- Broadpwn bug (CVE-2017-9417)☆52Updated 7 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago