Collection of modified open fuzzer.
☆30Jun 9, 2012Updated 13 years ago
Alternatives and similar repositories for segvault
Users that are interested in segvault are comparing it to the libraries listed below
Sorting:
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- Sample files for fuzzing ImageMagick☆19May 10, 2017Updated 8 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Python static analyzer☆11Dec 26, 2016Updated 9 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- LSE recruitment 2016 - Memory Checker☆11Jul 3, 2016Updated 9 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- An ARM Assembler and Simulator/Debugger☆15Jan 26, 2010Updated 16 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- A toolset for extending closed-source Linux processes☆10Apr 12, 2016Updated 9 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Aug 31, 2012Updated 13 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- MiKey is a minimal and modular Linux keylogger. It provides a toolkit that monitors and records all activities performed on a computer. I…☆14Jan 29, 2014Updated 12 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Kernel-level emulation of rdtsc for Mac OS X☆16Mar 15, 2015Updated 10 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- Patch kextd using radare2☆16Apr 10, 2015Updated 10 years ago
- INACTIVE - http://mzl.la/ghe-archive - Fuzzing Harness for Firefox Mobile on Android☆40Mar 28, 2019Updated 6 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago