Heartbleed vulnerability exploited π©Έ
β19Apr 11, 2023Updated 2 years ago
Alternatives and similar repositories for Heartbleed
Users that are interested in Heartbleed are comparing it to the libraries listed below
Sorting:
- Find Pitch of an Audio fileβ10Jun 10, 2019Updated 6 years ago
- β11Jul 5, 2023Updated 2 years ago
- Future Of Phishing With less delayβ15Sep 21, 2023Updated 2 years ago
- Simple PowerShell enumeration script to look for interesting filesβ10Aug 26, 2019Updated 6 years ago
- β13May 9, 2023Updated 2 years ago
- Python extension for the GNU project debugger (GDB)β13Mar 6, 2020Updated 6 years ago
- A brief tutorial for eBPF: Verifier, observability, networking, and security.β12Sep 19, 2024Updated last year
- CveBinarySheet: A Comprehensive Pre-built Binaries Database Focused on IoT Vulnerability Scenariosβ15Jan 17, 2025Updated last year
- tp-link Decrypt/Crypt Config filesβ15Oct 25, 2022Updated 3 years ago
- Material from ICS Village talk at DEFCON 25β12Jul 30, 2018Updated 7 years ago
- TLS 1.3 Handshake in Linux Kernel: 1. used by QUIC implementation on 'quic' branch; 2. used by NFS over TLS on 'sunrpc' branch; 3. usβ¦β12Dec 5, 2023Updated 2 years ago
- Exploit Development CheatSheet.β18Aug 9, 2021Updated 4 years ago
- Telegram Template Bot for creating Bots.β11Jan 19, 2022Updated 4 years ago
- β17Aug 31, 2014Updated 11 years ago
- OSED course preparation materials.β15May 27, 2021Updated 4 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/nβ¦β14Jan 19, 2025Updated last year
- Find infected ms17-010 machinesβ14May 26, 2017Updated 8 years ago
- β12Oct 14, 2023Updated 2 years ago
- A great tool for Distributive Denial of Service attack using our botnet that is completely free.β11Oct 29, 2019Updated 6 years ago
- Berkeley AI Pacman Project for developing search agents to play Pacmanβ10Oct 25, 2017Updated 8 years ago
- β14Sep 5, 2024Updated last year
- windows c++ mocking tool for global function, static and non virtual methodβ18Aug 3, 2024Updated last year
- Materials for the "Principles of Static Program Analysis" courseβ11Jul 17, 2025Updated 7 months ago
- This is NOT an Objective-C project. Menet is a TCP-based reverse proxy to help you expose a local server behind a NAT. It can be dynamicaβ¦β17Feb 18, 2023Updated 3 years ago
- Apply hot patches for running processes without restartingβ13Jun 1, 2020Updated 5 years ago
- β22Aug 27, 2025Updated 6 months ago
- How to mock free function?β17Nov 28, 2014Updated 11 years ago
- MemoryCleaner (A.K.A. MemCleaner) is a simple and very lightweight program to keep RAM memory clean in Windows machines.β10Feb 22, 2022Updated 4 years ago
- PWN Challengeβ11Apr 28, 2022Updated 3 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!β14Jun 2, 2019Updated 6 years ago
- Notes template for Offensive Security's EXP-301 course and OSED examβ21Mar 4, 2022Updated 4 years ago
- Convert a binary file to a PNG image and then back to binary.β15Oct 30, 2013Updated 12 years ago
- Convert low ghidra pcode to verifiable Cβ24Sep 13, 2024Updated last year
- Use openai to help you better translate function meanings and restore symbol tables from sub_xxxx functionsβ19Jul 1, 2024Updated last year
- Offensive Security Wireless Professionalβ17Mar 14, 2020Updated 5 years ago
- Hidden Community Detection in Social Networksβ14Feb 23, 2021Updated 5 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.β29Sep 23, 2025Updated 5 months ago
- Python version of DISCO toolkitβ12Nov 21, 2024Updated last year
- Montage is a system for building fast buffered persistent data structures on nonvolatile memory.β16Jun 9, 2022Updated 3 years ago