Helper script for working with format string bugs
☆57May 2, 2020Updated 5 years ago
Alternatives and similar repositories for formatStringExploiter
Users that are interested in formatStringExploiter are comparing it to the libraries listed below
Sorting:
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 10 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Simplify format string exploitation.☆347Nov 2, 2021Updated 4 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- ☆14Apr 28, 2016Updated 9 years ago
- ☆28Jan 27, 2017Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- ☆91Jun 23, 2016Updated 9 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Process heap analysis framework - Windows/Linux - record type inference and forensics☆95Jul 26, 2017Updated 8 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Sep 20, 2011Updated 14 years ago
- Crypt and decrypt the cisco enable 7 passwords☆13Jan 24, 2022Updated 4 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Sep 1, 2020Updated 5 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Apr 13, 2017Updated 8 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Cross Architecture Shellcode in C☆208Aug 24, 2016Updated 9 years ago
- ☆26Jun 3, 2016Updated 9 years ago
- Multi theaded DNS bruteforcing☆13May 7, 2014Updated 11 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Apr 11, 2017Updated 8 years ago
- DNS Spoof☆31Jun 23, 2020Updated 5 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago