ASUS Router infosvr UDP Broadcast root Command Execution
☆250Mar 16, 2015Updated 11 years ago
Alternatives and similar repositories for asus-cmd
Users that are interested in asus-cmd are comparing it to the libraries listed below
Sorting:
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Published security vulnerabilities, research, and associated information.☆138Dec 9, 2019Updated 6 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Hacker News written in Python☆18Feb 22, 2016Updated 10 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Tools for viewing and extracting HDD firmware files☆79Oct 1, 2014Updated 11 years ago
- ☆44Dec 23, 2014Updated 11 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Jul 5, 2015Updated 10 years ago
- strings for a Linux process' address space☆51Jun 15, 2013Updated 12 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Samsung Remote Code Execution as System User☆127Sep 22, 2016Updated 9 years ago
- Filet-O-Firewall Vulnerability PoC☆61Sep 4, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Nov 7, 2018Updated 7 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc☆93Jan 27, 2015Updated 11 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- LLDB MCP Integration + other helpful commands☆742Mar 29, 2025Updated 11 months ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,892Oct 23, 2020Updated 5 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆252Apr 14, 2019Updated 6 years ago
- ☆21Mar 24, 2015Updated 10 years ago