Helper script for working with format string bugs
☆57May 2, 2020Updated 5 years ago
Alternatives and similar repositories for formatStringExploiter
Users that are interested in formatStringExploiter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 11 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Simplify format string exploitation.☆348Nov 2, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- ☆15Apr 9, 2018Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- ☆14Apr 28, 2016Updated 9 years ago
- ☆28Jan 27, 2017Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆90Jun 23, 2016Updated 9 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Process heap analysis framework - Windows/Linux - record type inference and forensics☆95Jul 26, 2017Updated 8 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Sep 20, 2011Updated 14 years ago
- Crypt and decrypt the cisco enable 7 passwords☆13Jan 24, 2022Updated 4 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Sep 1, 2020Updated 5 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Apr 13, 2017Updated 8 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cross Architecture Shellcode in C☆209Aug 24, 2016Updated 9 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- ☆26Jun 3, 2016Updated 9 years ago
- Multi theaded DNS bruteforcing☆13May 7, 2014Updated 11 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆81Apr 11, 2017Updated 8 years ago
- DNS Spoof☆31Jun 23, 2020Updated 5 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago