RUB-NDS / alpaca-codeLinks
Artifacts to the ALPACA attack.
☆60Updated 3 years ago
Alternatives and similar repositories for alpaca-code
Users that are interested in alpaca-code are comparing it to the libraries listed below
Sorting:
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆142Updated 2 years ago
- SNIcat☆127Updated 4 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 3 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆88Updated last year
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- SSD Challenges☆47Updated 2 years ago
- Where CTFs happen☆81Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- A beginner-friendly CTF about Kubernetes security.☆79Updated 3 years ago
- Artifacts for the Black Hat talk.☆105Updated 5 years ago
- ☆63Updated 2 years ago
- Google Chrome Use After Free☆59Updated 3 years ago
- Linux kernel exploits for local privilege escalation☆79Updated 6 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆89Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆208Updated 2 months ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆72Updated 4 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆137Updated 2 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 10 months ago
- ☆37Updated 2 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago