mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
☆275Oct 20, 2020Updated 5 years ago
Alternatives and similar repositories for InsecureProgramming
Users that are interested in InsecureProgramming are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 9 years ago
- ☆137Mar 29, 2018Updated 8 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Linux bind shell with anti-reverse engineering techniques☆295Feb 9, 2017Updated 9 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Course materials for Modern Binary Exploitation by RPISEC☆5,967Dec 9, 2021Updated 4 years ago
- Duncan - Blind SQL injector skeleton☆60Jan 11, 2022Updated 4 years ago
- Automated enumeration☆30Apr 14, 2021Updated 5 years ago
- Some security related notes