RUB-NDS / alpaca-codeLinks
Artifacts to the ALPACA attack.
☆60Updated 3 years ago
Alternatives and similar repositories for alpaca-code
Users that are interested in alpaca-code are comparing it to the libraries listed below
Sorting:
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆87Updated 3 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- ☆68Updated 4 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 7 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- SNIcat☆128Updated 4 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆163Updated last year
- SSD Challenges☆48Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆143Updated 3 years ago
- ☆79Updated last year
- Linux kernel exploits for local privilege escalation☆81Updated 7 years ago
- Google Chrome Use After Free☆61Updated 3 years ago
- CVE-2020-1206 Uninitialized Kernel Memory Read POC☆147Updated 5 years ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Updated 3 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- ☆48Updated 5 years ago
- Exploit for CVE-2021-4034☆94Updated 3 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆67Updated 8 years ago
- ☆212Updated last month
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- Collection of my slide decks☆109Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆71Updated 4 years ago