CVE-2016-1287 vulnerability test
☆16Feb 15, 2016Updated 10 years ago
Alternatives and similar repositories for killasa
Users that are interested in killasa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18May 3, 2016Updated 9 years ago
- Fork of node-named (DNS server in node.js) with AXFR, IXFR, TCP support and more☆11Nov 3, 2021Updated 4 years ago
- ☆111May 16, 2017Updated 8 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Mar 16, 2018Updated 8 years ago
- Large Scale Cumulative Binary Diffing.☆25Mar 10, 2018Updated 8 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- A centralized location for all presentations I've given at various conferences☆26Sep 1, 2017Updated 8 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Jun 13, 2022Updated 3 years ago
- Dynamips-GDB-Mod is a patch to the Dynamips Cisco IOS emulator which facilitates debugging and reverse engineering process of Cisco IOS.☆33Mar 13, 2013Updated 13 years ago
- Property editor for Umbraco CMS to allow embedding 3rd party media like Youtube, Vimeo, ... outside of the rich text editor.☆10Feb 28, 2026Updated 3 weeks ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 9 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- Jump and run through Liip's 10 year history☆13Oct 22, 2019Updated 6 years ago
- Ida Pro debugger module for Playstation 3☆48Sep 14, 2022Updated 3 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- Node JS Avro implementation☆27Jul 15, 2020Updated 5 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Mar 13, 2014Updated 12 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆77Jul 10, 2017Updated 8 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated 2 months ago
- A console for assemble/disassemble code using capstone/keystone☆32May 14, 2018Updated 7 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- generates images for the blog or social media☆20Jan 7, 2023Updated 3 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Jun 1, 2015Updated 10 years ago
- Exfiltrate data over screen interfaces☆58Nov 13, 2017Updated 8 years ago
- Scripts for making Hubot a CND Sidekick☆59Apr 14, 2016Updated 9 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago