hackers-terabit / miraiLinks
backup (educational) of the mirai bot source and instructions.
☆23Updated 8 years ago
Alternatives and similar repositories for mirai
Users that are interested in mirai are comparing it to the libraries listed below
Sorting:
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆52Updated 9 years ago
- Slides, papers, etc☆31Updated last year
- ☆52Updated 10 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 9 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆77Updated 3 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Updated 8 years ago
- A Libemu Cython wrapper☆126Updated last year
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- ☆50Updated 7 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Updated 9 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- hax 'n shit☆119Updated 10 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 11 years ago
- ☆89Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 7 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- ☆93Updated 7 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago
- Proof of Concept's provided by Source Incite☆37Updated 8 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- softScheck Cloud Fuzzing Framework☆58Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago