Automated Application Generation for Stack Overflow Types on Wireless Routers
☆54Jul 15, 2019Updated 6 years ago
Alternatives and similar repositories for Router-Exploit-Shovel
Users that are interested in Router-Exploit-Shovel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25May 9, 2021Updated 4 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- SDK-SMS-Stack☆28Jan 4, 2023Updated 3 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- messing around writing reversing tools in clojure☆15Nov 9, 2017Updated 8 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- ☆32Apr 28, 2022Updated 3 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Feb 17, 2020Updated 6 years ago
- Ditto.☆18Jul 23, 2020Updated 5 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆27Dec 17, 2019Updated 6 years ago
- A tool for malicious behavior detection in IoT devices☆77Nov 24, 2018Updated 7 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆16Feb 12, 2025Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆26Sep 2, 2025Updated 6 months ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- ☆22Jan 24, 2019Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- ☆12Nov 2, 2022Updated 3 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago