igavriil / buffer-overflow
exploit vulnerable c/c++ programms with buffer overflow attacks
☆24Updated 2 years ago
Alternatives and similar repositories for buffer-overflow:
Users that are interested in buffer-overflow are comparing it to the libraries listed below
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Web based code browser using clang to provide basic code analysis.☆44Updated 7 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆36Updated 12 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Challenges from the DEF CON 2015 Finals Live CTF☆14Updated 9 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- CTF exploit development and other tools of pwnage☆21Updated 5 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 8 years ago
- ☆13Updated 7 years ago
- ☆10Updated 2 months ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 8 years ago
- ☆20Updated 7 years ago
- ☆28Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆42Updated 6 years ago
- ☆17Updated 6 years ago
- Format string exploit generation☆10Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Fuzzer☆43Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Packet Acumen☆19Updated 10 years ago
- Application Security library☆11Updated 12 years ago