The Damn Vulnerable Router Firmware Project
☆30Feb 5, 2018Updated 8 years ago
Alternatives and similar repositories for DVRF
Users that are interested in DVRF are comparing it to the libraries listed below
Sorting:
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- ☆11Sep 1, 2023Updated 2 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆53Dec 21, 2017Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Identify web application versions☆18Apr 14, 2017Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- ☆18Nov 19, 2020Updated 5 years ago
- Metasploit Framework☆11Sep 5, 2017Updated 8 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 6 years ago
- ☆17Dec 1, 2019Updated 6 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Aug 28, 2013Updated 12 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- A fast generative fuzzer for HTTP☆16Nov 29, 2018Updated 7 years ago
- ☆32Apr 29, 2017Updated 8 years ago
- Use openai to help you better translate function meanings and restore symbol tables from sub_xxxx functions☆19Jul 1, 2024Updated last year
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- ☆23Mar 11, 2014Updated 11 years ago
- Python Package for burprestapi☆17Dec 27, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Basic log analysis tool to detect impossible travel via IP address geographic information☆20Apr 29, 2019Updated 6 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- Sorano☆16Jul 30, 2019Updated 6 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Nov 25, 2020Updated 5 years ago
- IPv6 port scanner designed to be fast, aimed at Internet scanning and discovery☆177Jan 29, 2026Updated last month
- Suricata rules for Emerging Threats and funkyness☆75May 15, 2017Updated 8 years ago
- ☆18May 16, 2019Updated 6 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- Utility that can extract the internal forms represenation from both EFI and UEFI modules.☆19Oct 18, 2017Updated 8 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago