uc-httpd 1.0.0 buffer overflow exploit PoC
☆16Jun 26, 2018Updated 7 years ago
Alternatives and similar repositories for uc-httpd-1.0.0-buffer-overflow-exploit
Users that are interested in uc-httpd-1.0.0-buffer-overflow-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ELF binary file format parser in C☆13Jul 17, 2021Updated 4 years ago
- Android TV automation framework via ADB command shell and python☆12Sep 30, 2018Updated 7 years ago
- pwn & ctf tools for windows☆25Jun 21, 2020Updated 5 years ago
- Allows external systems or MCUs to connect BLE (CC2540) using HCI as BLE Central Role☆11Jul 1, 2015Updated 10 years ago
- Arduino Library for the Lepton FLiR Thermal Camera Module.☆12Jan 13, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Control thousands of WS2811/2812 LEDs at video refresh speeds☆12May 5, 2015Updated 10 years ago
- Website for pid.codes☆13Apr 10, 2015Updated 11 years ago
- Receiving OSC messages via the Autopilot class to fly the AR Parrot drone☆15Feb 2, 2014Updated 12 years ago
- Xiongmai IP Camera Simple API in Python☆27Oct 21, 2021Updated 4 years ago
- Version 2 of the Phantom 3/Inspire 1 Firmware tool.☆13Nov 5, 2019Updated 6 years ago
- https://medium.com/@anderson_pablo/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7☆13May 17, 2023Updated 2 years ago
- read Mavic Air Battery info with NodeMCU (esp8266)☆10Jun 7, 2018Updated 7 years ago
- This repository contains stuff which would be helpful for jailbroken iOS development.☆14Sep 15, 2015Updated 10 years ago
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- RPM Signal Generator V2.0☆10Oct 17, 2017Updated 8 years ago
- Open Source Sequential Shift light V3.1☆17Apr 28, 2023Updated 2 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- Arduino sketches and Perl script to program flash on Nordic nRF24LE1 wireless SOC☆18Feb 24, 2015Updated 11 years ago
- Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and OS X Apps☆18Apr 13, 2018Updated 8 years ago
- A clash royale proxy for v2.4☆22Nov 22, 2018Updated 7 years ago
- GhostSec Scam Detection Tool☆16Feb 11, 2021Updated 5 years ago
- Control a modified Keurig K40☆12Apr 12, 2016Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Aerial platform for Recon, Intelligence and Pentesting. #R-KALI #Porunga☆16Aug 28, 2018Updated 7 years ago
- Poor Maker's Infrared receiver☆13Jun 27, 2015Updated 10 years ago
- ☆11Apr 23, 2020Updated 5 years ago
- http 302 redirect iptables module☆11Aug 26, 2017Updated 8 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Exploit for CVE-2022-27226☆15Mar 19, 2022Updated 4 years ago
- Tools for the K40 Laser Cutter using K40Nano API☆14Jun 3, 2019Updated 6 years ago
- Gerbil's Inkscape Plugins for the K40☆12Feb 24, 2019Updated 7 years ago
- CC模拟器☆13Mar 21, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Moxa Nport devices enumerate script☆16Apr 9, 2016Updated 10 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆46Jan 26, 2019Updated 7 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- This is a simple program that allows you to bruteforce a protected web page where the authentication type is Basic Authentication☆11Dec 8, 2022Updated 3 years ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year
- arp spoof tool by lzx☆18Jan 23, 2014Updated 12 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago