b1ack0wl / DVRF
The Damn Vulnerable Router Firmware Project
☆30Updated 7 years ago
Alternatives and similar repositories for DVRF:
Users that are interested in DVRF are comparing it to the libraries listed below
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Capture The Flag Binary fuzzer for Heap challanges☆39Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 6 months ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- The Dumb Network Fuzzer☆19Updated last year
- 802.15.4 Fuzzer☆21Updated 5 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- ☆36Updated 5 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 5 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆23Updated 9 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 9 months ago
- ☆20Updated 5 years ago
- Dockerfiles for (un)popular fuzzers!☆29Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- For code snippets and information☆41Updated 5 years ago
- exploit development☆49Updated 6 years ago
- Flare-On solutions☆36Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- ☆44Updated 6 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 4 years ago