RUB-NDS / alpaca-codeLinks
Artifacts to the ALPACA attack.
☆60Updated 3 years ago
Alternatives and similar repositories for alpaca-code
Users that are interested in alpaca-code are comparing it to the libraries listed below
Sorting:
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- SSD Challenges☆48Updated 3 years ago
- A beginner-friendly CTF about Kubernetes security.☆80Updated 3 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆189Updated last year
- ☆65Updated 2 years ago
- d(ockerp)wn - a docker pwn tool manager☆155Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆70Updated 4 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 6 months ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- ☆36Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- ☆79Updated last year
- Linux kernel exploits for local privilege escalation☆81Updated 7 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64Updated 2 years ago
- Where CTFs happen☆82Updated last year
- HTTP Desync Attack☆28Updated 5 years ago
- ☆212Updated last week
- A toolbox for extracting RSA private keys from public keys.☆189Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- A repository of previous info-sec presentations I've presented.☆163Updated last year
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- CQ, a code security scanner☆100Updated last year
- ☆64Updated last year
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 5 years ago
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆82Updated 3 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆90Updated 4 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago