RUB-NDS / alpaca-codeLinks
Artifacts to the ALPACA attack.
☆60Updated 3 years ago
Alternatives and similar repositories for alpaca-code
Users that are interested in alpaca-code are comparing it to the libraries listed below
Sorting:
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆100Updated 2 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated last year
- A repository of previous info-sec presentations I've presented.☆161Updated 7 months ago
- A beginner-friendly CTF about Kubernetes security.☆78Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- ☆24Updated 3 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 2 weeks ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated last year
- TLS CBC Padding Oracle Checker☆52Updated 3 years ago
- A git history of Windows filesystems☆76Updated 4 years ago
- A collection of my public security advisories.☆23Updated last month
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- ☆27Updated 2 years ago
- Organise and access data collected during internal network pentests☆10Updated 5 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- SNIcat☆126Updated 3 years ago
- From Zero to Hero in Web Security Research - Def Con 29 Workshop☆36Updated 10 months ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆223Updated 4 years ago
- Binary Golf Library☆62Updated 4 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆122Updated 3 years ago
- ☆48Updated 4 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆35Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆54Updated 3 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- ☆29Updated 4 years ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆20Updated 6 years ago
- Script for searching the extracted firmware file system for goodies!☆29Updated 5 years ago
- ☆37Updated 4 years ago