RUB-NDS / alpaca-codeLinks
Artifacts to the ALPACA attack.
☆60Updated 3 years ago
Alternatives and similar repositories for alpaca-code
Users that are interested in alpaca-code are comparing it to the libraries listed below
Sorting:
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆142Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- SSD Challenges☆47Updated 2 years ago
- ☆36Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 4 months ago
- A repository of previous info-sec presentations I've presented.☆161Updated 10 months ago
- ☆79Updated last year
- ☆211Updated 3 months ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆91Updated 3 years ago
- Kernel Support for miscellaneous (your favourite) exploits☆22Updated 8 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- A beginner-friendly CTF about Kubernetes security.☆80Updated 3 years ago
- Where CTFs happen☆81Updated last year
- Linux kernel exploits for local privilege escalation☆79Updated 7 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆59Updated 5 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆73Updated 2 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆84Updated 3 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆62Updated 2 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Updated 3 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆86Updated 3 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆89Updated 5 months ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago