igavriil / buffer-overflow
exploit vulnerable c/c++ programms with buffer overflow attacks
☆24Updated 2 years ago
Alternatives and similar repositories for buffer-overflow:
Users that are interested in buffer-overflow are comparing it to the libraries listed below
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- ☆42Updated 6 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- Packet Acumen☆19Updated 10 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Updated 6 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- XSS Weaponization☆34Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- ☆17Updated 6 years ago
- ☆8Updated 4 years ago
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Reverse Engineering tool for Ethereum EVM☆19Updated 8 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- ☆15Updated 8 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆10Updated 7 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- simple rootkit for computer security class☆14Updated 12 years ago