geeknik / cve-fuzzing-poc
PoCs discovered through fuzzing which resulted in a CVE assignment.
☆18Updated 5 years ago
Alternatives and similar repositories for cve-fuzzing-poc:
Users that are interested in cve-fuzzing-poc are comparing it to the libraries listed below
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆26Updated last year
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Random stuff for FlareOn☆13Updated 6 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- ☆10Updated 3 months ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- ☆13Updated 4 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Regular expression Search on the command-line☆16Updated last month
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- ☆17Updated 4 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆20Updated 4 years ago
- "HeaderScan" Burp Plugin☆16Updated 11 years ago
- Format string exploit generation☆10Updated 9 years ago