guedou / scapy-handson
Scapy hands-on
☆31Updated 10 months ago
Related projects: ⓘ
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆55Updated 5 months ago
- HN Security's advisories.☆20Updated 3 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category …☆55Updated last year
- Cisco ASA Software and ASDM Security Research☆76Updated 2 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Simple WebSocket fuzzer☆32Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆33Updated 11 months ago
- Reverse Engineering and Observability toolkit for Draytek firewalls☆29Updated last month
- ☆70Updated last year
- #INFILTRATE20 raptor's party pack.☆28Updated 8 months ago
- An automated setup for compiling & fuzzing Apache httpd server☆47Updated last year
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆86Updated 11 months ago
- POC of CVE-2023-35086 only DoS☆44Updated last year
- ☆65Updated this week
- ☆71Updated 2 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Updated 2 years ago
- ☆69Updated 2 years ago
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆42Updated 2 years ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆44Updated 2 months ago
- Collection of slides☆33Updated 4 months ago
- ☆26Updated 2 years ago
- Malware Analysis tools☆22Updated this week
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Updated 2 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆48Updated 11 months ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆81Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆119Updated 2 years ago
- Apt style exploitation of Chrome 0day CVE-2023-4357☆42Updated 10 months ago
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- ☆90Updated 2 years ago