RUB-NDS / alpaca-codeLinks
Artifacts to the ALPACA attack.
☆60Updated 3 years ago
Alternatives and similar repositories for alpaca-code
Users that are interested in alpaca-code are comparing it to the libraries listed below
Sorting:
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆82Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- ☆211Updated 3 months ago
- SSD Challenges☆48Updated 3 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆139Updated 2 years ago
- ☆63Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 3 years ago
- SNIcat☆128Updated 4 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆87Updated 3 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 3 weeks ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆59Updated 5 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated last year
- Linux kernel exploits for local privilege escalation☆80Updated 7 years ago
- Proof-of-concept for Spook.js☆70Updated 4 years ago
- Scripts I used during CTP☆67Updated 5 years ago
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt☆183Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆72Updated 4 years ago
- ☆79Updated last year
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated last year
- ☆36Updated 4 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- Exploit for CVE-2021-4034☆93Updated 3 years ago
- A toolbox for extracting RSA private keys from public keys.☆187Updated 4 years ago