RUB-NDS / alpaca-codeLinks
Artifacts to the ALPACA attack.
☆61Updated 3 years ago
Alternatives and similar repositories for alpaca-code
Users that are interested in alpaca-code are comparing it to the libraries listed below
Sorting:
- SSD Challenges☆48Updated 3 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆114Updated 3 years ago
- ☆36Updated 4 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆143Updated 3 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆65Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆94Updated 3 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 8 months ago
- HTTP Desync Attack☆28Updated 5 years ago
- Where CTFs happen☆82Updated last year
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆61Updated 5 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 4 years ago
- A beginner-friendly CTF about Kubernetes security.☆80Updated 3 years ago
- ☆79Updated last year
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated 2 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆192Updated last year
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆82Updated 3 years ago
- Linux kernel exploits for local privilege escalation☆81Updated 7 years ago
- ☆11Updated 7 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆91Updated 4 years ago
- Complete SMS packet manipulation☆114Updated 4 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- Scapy hands-on☆35Updated 2 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆141Updated last year