Cisco ASA Software and ASDM Security Research
☆87Sep 6, 2022Updated 3 years ago
Alternatives and similar repositories for cisco_asa_research
Users that are interested in cisco_asa_research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- A collection of POP exploits.☆30Feb 22, 2021Updated 5 years ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- ☆44Mar 2, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An automated setup for compiling & fuzzing Apache httpd server☆51Mar 21, 2026Updated last month
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆549Feb 1, 2024Updated 2 years ago
- Set of scripts to deal with Cisco ASA firmware [pack/unpack etc.]☆105Jun 13, 2022Updated 3 years ago
- ☆26Oct 13, 2021Updated 4 years ago
- SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)☆97Jan 11, 2022Updated 4 years ago
- IDA Hexrays To Joern☆46Nov 7, 2024Updated last year
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 8 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆57Dec 31, 2025Updated 4 months ago
- Lexmark CVE-2023-26067☆28Aug 8, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- qemu vulnerablity.☆57May 25, 2021Updated 4 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆662May 13, 2025Updated 11 months ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆175Jan 29, 2026Updated 3 months ago
- 国科大软件安全原理作业☆25Oct 27, 2020Updated 5 years ago
- Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well.☆43Aug 28, 2022Updated 3 years ago
- ☆285Aug 30, 2022Updated 3 years ago
- DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019☆69May 5, 2023Updated 3 years ago
- Frida plugin for Binary Ninja☆20Jan 12, 2025Updated last year
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆36Feb 4, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆38Nov 29, 2022Updated 3 years ago
- Framework for creating fuzzers and negative tests for TLS 1.3 implementations☆13Mar 21, 2024Updated 2 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆183Mar 29, 2022Updated 4 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆32Feb 1, 2021Updated 5 years ago
- IoT固件漏洞挖掘工具☆247Nov 11, 2022Updated 3 years ago
- Various debugging tools such as %DumpObjects for v8☆56Jan 23, 2019Updated 7 years ago
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated last year
- ☆16Mar 23, 2018Updated 8 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Security Operation Tool Based on Large Language Models 基于大语言模型的安全运营工具☆23Mar 20, 2024Updated 2 years ago
- ☆15Sep 5, 2024Updated last year
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆346Dec 12, 2024Updated last year
- Citrix ADC从权限绕过到RCE☆45Jul 12, 2020Updated 5 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆403Aug 15, 2025Updated 8 months ago
- Passive Security Tools Fingerprinting Framework☆75Mar 26, 2021Updated 5 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago