iZsh / exploits
various exploits
☆31Updated 12 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- OS X rootkit loader version #1☆18Updated 10 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- ☆12Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- ☆24Updated 11 years ago
- ☆72Updated 10 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Updated 11 years ago
- Anti Hacking Team TrustedBSD module☆26Updated 10 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated last month
- small utility to dump kernel memory☆25Updated 10 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆27Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- OS X rootkit loader version #2☆12Updated 10 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- UAC Copy Tool☆9Updated 9 years ago
- Scan binaries for encryption algorithms/file systems/..☆16Updated 8 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- An OSX exploitation helper library.☆35Updated 9 years ago
- Visualize an ELF's execution☆11Updated 10 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- See my shmoocon talk repo for updated code:☆25Updated 11 years ago
- Exploit kit analyzer☆21Updated 10 years ago