RUB-NDS / alpaca-codeLinks
Artifacts to the ALPACA attack.
☆60Updated 3 years ago
Alternatives and similar repositories for alpaca-code
Users that are interested in alpaca-code are comparing it to the libraries listed below
Sorting:
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- ☆24Updated 4 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- Tools for investigating Log4j CVE-2021-44228☆95Updated 3 years ago
- ☆47Updated 2 years ago
- SNIcat☆126Updated 3 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated last month
- A git history of Windows filesystems☆76Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆224Updated 4 years ago
- A beginner-friendly CTF about Kubernetes security.☆78Updated 2 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- SSD Challenges☆47Updated 2 years ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- Linux privilege escalation via LXD☆134Updated 5 years ago
- Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.☆233Updated 4 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆224Updated 5 years ago
- ☆63Updated 2 years ago
- ☆37Updated 4 years ago
- A PoC for CVE-2020-0601☆337Updated 2 years ago
- Google Chrome Use After Free☆57Updated 3 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆73Updated 4 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Updated 4 years ago
- Statically built netcat binaries for Linux (other OSes can be added later)☆35Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github☆61Updated 4 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆96Updated 9 months ago
- NAT Slipstream attack code samples☆48Updated 4 years ago