guedou / scapy-handson
Scapy hands-on
☆34Updated last year
Related projects ⓘ
Alternatives and complementary repositories for scapy-handson
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆61Updated 7 months ago
- HN Security's advisories.☆21Updated 3 weeks ago
- Dynamic-Static binary instrumentation framework on top of GDB☆49Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆59Updated last year
- Cisco ASA Software and ASDM Security Research☆78Updated 2 years ago
- Simple WebSocket fuzzer☆32Updated last year
- A tool for firmware cartography☆138Updated 8 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆34Updated last year
- Reverse Engineering and Observability toolkit for Draytek firewalls☆29Updated last month
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆36Updated 11 months ago
- #INFILTRATE20 raptor's party pack.☆28Updated 10 months ago
- An automated setup for compiling & fuzzing Apache httpd server☆47Updated last year
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆86Updated last year
- ☆71Updated last year
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆52Updated last year
- Arlo file format helper☆12Updated 8 months ago
- USB device hardware core with modified behaviour capable of injecting transmissions on behalf of other devices☆26Updated 10 months ago
- ☆31Updated 5 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆122Updated 2 years ago
- ☆100Updated last month
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆43Updated 2 years ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆44Updated 4 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆105Updated 8 months ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆83Updated last year
- ☆42Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- ☆25Updated 9 months ago
- ☆91Updated 3 years ago
- ☆69Updated 2 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated 9 months ago