The Damn Vulnerable Router Firmware Project
☆30Feb 5, 2018Updated 8 years ago
Alternatives and similar repositories for DVRF
Users that are interested in DVRF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆53Dec 21, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Use openai to help you better translate function meanings and restore symbol tables from sub_xxxx functions☆19Jul 1, 2024Updated last year
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆29Jan 4, 2024Updated 2 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago
- ☆13Oct 29, 2022Updated 3 years ago
- ☆19May 16, 2019Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- ☆18Nov 19, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Feb 19, 2019Updated 7 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Aug 28, 2013Updated 12 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 6 months ago
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- ☆16Dec 1, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13May 9, 2023Updated 2 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- amd64 Linux docker container for cross-compilation to FreeBSD.☆12May 22, 2024Updated last year
- A VM for RE and Pwn☆25May 17, 2024Updated last year
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- Material from ICS Village talk at DEFCON 25☆12Jul 30, 2018Updated 7 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Symmetric JavaScript☆13Jul 12, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆17Aug 31, 2014Updated 11 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆21Dec 23, 2017Updated 8 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- My WIP bin, various interesting open-source work in progress☆11Aug 2, 2021Updated 4 years ago
- Show syscall information for different architectures☆15Aug 26, 2017Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- ☆14Sep 5, 2024Updated last year