exploit vulnerable c/c++ programms with buffer overflow attacks
☆24Jul 18, 2022Updated 3 years ago
Alternatives and similar repositories for buffer-overflow
Users that are interested in buffer-overflow are comparing it to the libraries listed below
Sorting:
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Bbuzz: a bit-aware network protocol fuzzing and reverse engineering framework☆23Jan 27, 2021Updated 5 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- Hardware Security Labs☆31May 3, 2017Updated 8 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- RECon 2017 IDA skin & color scheme☆28Jun 16, 2017Updated 8 years ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- OAuth plugin for Burp Suite Extender☆43Jun 27, 2018Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Apr 30, 2016Updated 9 years ago
- A module for CME that spiders across a domain.☆35Jul 15, 2022Updated 3 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 5 years ago
- Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. …☆46Sep 30, 2013Updated 12 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- homebridge smartthings plugin☆21Feb 17, 2026Updated last week
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Jul 29, 2018Updated 7 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆31Feb 28, 2018Updated 8 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- ☆38Nov 29, 2022Updated 3 years ago
- Linux Memory Cryptographic Keys Extractor☆240May 22, 2023Updated 2 years ago
- MAGENTO implementation - CARD Processing @mobilPay☆11May 15, 2025Updated 9 months ago
- Encoders and Decoders for RF and IR protocols used for remote control and data acquisition. Both Encoders and Decoders can be supplied as…☆13Jul 29, 2017Updated 8 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- Script collection for SSH User Login notifications over Pushover.net☆12Jun 6, 2021Updated 4 years ago
- Synchronizable PBKDF2 based password generator☆14Dec 31, 2016Updated 9 years ago
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- Android lockscreen password cracker via ADB (Tested only on Asus Zenfone 4 A450CG )☆10Jul 3, 2017Updated 8 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- This script checks visa application status using idata.com.tr services in Turkey (for Germany and Italy) and notifies OSX Notification Ce…☆11Jul 9, 2015Updated 10 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 9 months ago
- Implements a simple "Wasp in the Box" algorithm for SmartThings☆11Feb 10, 2015Updated 11 years ago
- DEPRECATED: Element Hiding Helper extension for Adblock Plus☆11Dec 1, 2017Updated 8 years ago