guilhermeferreira / spikeppLinks
SPIKE is a protocol fuzzer creation kit. It provides an API that allows a user to create their own fuzzers for network based protocols using the C++ programming language. The tool defines a number of primitives that it makes available to C coders, which allows it to construct fuzzed messages called “SPIKES” that can be sent to a network service …
☆83Updated 8 years ago
Alternatives and similar repositories for spikepp
Users that are interested in spikepp are comparing it to the libraries listed below
Sorting:
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 7 years ago
- Scripts I used during CTP☆67Updated 5 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 5 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆38Updated 2 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆150Updated 9 years ago
- Exploitation and Mitigation Slides☆131Updated last year
- Fork of mona.py with x64dbg support☆105Updated 3 years ago
- VerSprite Security Research☆171Updated 2 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Exploiting challenges in Linux and Windows☆119Updated 5 years ago
- Used for the osce exam preparation☆74Updated 9 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆173Updated 8 years ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆74Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- A cheat sheet for attacking SQLite via SQLi☆99Updated 9 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆182Updated 5 years ago
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆76Updated 6 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆52Updated 9 years ago
- ☆88Updated 7 years ago
- ☆154Updated 3 years ago
- Published vulnerabilities and exploits.☆57Updated 2 years ago
- VoidHack CTF write-ups☆60Updated 6 years ago
- BSidesSF CTF 2019 release☆71Updated 2 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆162Updated 11 months ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year