Remote kernel exploit for ROSE amateur radio
☆24Aug 8, 2011Updated 14 years ago
Alternatives and similar repositories for rose-exploit
Users that are interested in rose-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple framework for developing Linux kernel heap exploit techniques☆114Jul 24, 2020Updated 5 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Malamute is a fuzzing toolkit initially developed to aid with regression-test based fuzzing of language interpreters☆29Jan 4, 2016Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- OpenType font file format fuzzer for Windows☆52Jun 8, 2013Updated 12 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Sep 28, 2015Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- ☆29May 13, 2018Updated 7 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Server component of the mobile labs☆36Nov 30, 2011Updated 14 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- DOS Program Development☆13Nov 9, 2022Updated 3 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Oct 3, 2013Updated 12 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Nerve is a cross platform hit tracer built on Ragweed☆47Dec 6, 2011Updated 14 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- ☆12Jun 13, 2016Updated 9 years ago