brad-anton / dot1x-peachpitsView external linksLinks
A collection of PeachPits for Peach Fuzzer to support EAP, 802.1x, and RADIUS Fuzzing
☆17Dec 29, 2015Updated 10 years ago
Alternatives and similar repositories for dot1x-peachpits
Users that are interested in dot1x-peachpits are comparing it to the libraries listed below
Sorting:
- Black Box Fuzzing(Bluetooth)☆10Apr 26, 2016Updated 9 years ago
- Mobile phone PWN tools and scripts☆15Sep 20, 2020Updated 5 years ago
- Uncover IPv6 address harvesting through firewall log analysis☆13Jan 29, 2016Updated 10 years ago
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆27Nov 30, 2018Updated 7 years ago
- ☆50Dec 28, 2012Updated 13 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Dockerfile for peach pro with everything set up as needed☆26Jun 29, 2024Updated last year
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆22Feb 8, 2026Updated last week
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Peach Pit for HTTP/2 Targeting Microsoft Edge☆63Dec 23, 2016Updated 9 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- ☆25Jul 6, 2017Updated 8 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- headless-ida-mcp-server☆28Apr 4, 2025Updated 10 months ago
- Simple but effective word list transmutation command-line app. Feed it words, and mangle them into new variations quickly and easily!☆33May 5, 2016Updated 9 years ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆11Updated this week
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆14Oct 23, 2025Updated 3 months ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated 2 weeks ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- PowerShellUtilities provides various utility commandlets.☆51Aug 3, 2020Updated 5 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- This Android Application encodes and decodes secret text message and image into and from the cover image. To encode text message and imag…☆10Jul 12, 2024Updated last year
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- CAPE monitor DLLs☆41Dec 3, 2019Updated 6 years ago
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago