SecurityInnovation / Research
A repository of public reports, publications, and presentations associated with research performed by Security Engineers at Security Innovation.
☆53Updated 5 years ago
Alternatives and similar repositories for Research:
Users that are interested in Research are comparing it to the libraries listed below
- ☆112Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- Exploits, Fuzzers, Scripts etc☆33Updated 4 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- ☆74Updated 2 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- PoC implementation of the POODLE attack☆69Updated 9 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 9 months ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Updated 5 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 8 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- ☆50Updated 7 years ago
- Exploit collection for NT privilege escalation☆66Updated 9 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- ☆32Updated 9 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆60Updated 9 years ago