arthastang / Router-Exploit-Shovel
Automated Application Generation for Stack Overflow Types on Wireless Routers
☆53Updated 5 years ago
Alternatives and similar repositories for Router-Exploit-Shovel:
Users that are interested in Router-Exploit-Shovel are comparing it to the libraries listed below
- Exploitation challenges for CTF☆62Updated 7 years ago
- Challenges and vulnerabilities exploitation.☆58Updated 4 years ago
- ☆24Updated 9 months ago
- public exploits☆35Updated last year
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated last year
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 6 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 5 years ago
- ☆39Updated 6 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 5 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- ☆25Updated 3 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- ☆11Updated 2 years ago
- My fuzzing workshop from PHDays9☆27Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Firmware analysis website + API☆42Updated 4 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 6 months ago
- ☆15Updated 2 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 7 years ago
- ☆72Updated 5 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆77Updated 7 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- Automation framework for attack-defense CTFs.☆15Updated 5 years ago