CVE-2016-1287 vulnerability test
☆16Feb 15, 2016Updated 10 years ago
Alternatives and similar repositories for killasa
Users that are interested in killasa are comparing it to the libraries listed below
Sorting:
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Fork of node-named (DNS server in node.js) with AXFR, IXFR, TCP support and more☆11Nov 3, 2021Updated 4 years ago
- ☆111May 16, 2017Updated 8 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 8 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Mar 16, 2018Updated 7 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Mar 13, 2014Updated 11 years ago
- A centralized location for all presentations I've given at various conferences☆26Sep 1, 2017Updated 8 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated last month
- ☆28Dec 20, 2018Updated 7 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Jun 16, 2023Updated 2 years ago
- ☆13Aug 5, 2025Updated 6 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆34Feb 4, 2025Updated last year
- Flare-On solutions☆37Oct 11, 2019Updated 6 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Network based protocol fuzzer☆74Feb 17, 2022Updated 4 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 9 years ago
- PoC CVE-2020-6308☆36Dec 29, 2020Updated 5 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆77Jul 10, 2017Updated 8 years ago
- Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.☆37Oct 25, 2017Updated 8 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- Compiler exploits and exploitable non-obvious source code back doors.