baiduxlab / sgxrayLinks
☆44Updated 4 years ago
Alternatives and similar repositories for sgxray
Users that are interested in sgxray are comparing it to the libraries listed below
Sorting:
- Static Token And Credential Scanner☆95Updated 2 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 5 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Updated last year
- Scripts I used during CTP☆68Updated 5 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- A tool for auditing medical devices and healthcare infrastructure☆22Updated last month
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- Some vulnerability research slides that I made☆12Updated 4 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Presentations from the CX Security Labs team☆35Updated 6 months ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 2 months ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- ☆20Updated 4 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆130Updated 5 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆39Updated 7 years ago
- Passive Security Tools Fingerprinting Framework☆75Updated 4 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆51Updated 2 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago