kientuong114 / docker-mitmLinks
A Man in the Middle proof of concept using docker containers
☆21Updated 4 years ago
Alternatives and similar repositories for docker-mitm
Users that are interested in docker-mitm are comparing it to the libraries listed below
Sorting:
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 11 months ago
- An automatic Blind ROP exploitation tool☆207Updated 2 years ago
- Reverse engineering software using a full system simulator☆191Updated last week
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated 3 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆132Updated 3 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆22Updated 3 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated 2 years ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆54Updated last year
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆46Updated 3 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆126Updated 2 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- A tool for firmware cartography☆165Updated 2 months ago
- ☆117Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆56Updated 3 years ago
- ASLR bypass without infoleak☆167Updated 4 years ago
- CTFs and solutions for Linux binary exploitation.☆113Updated last year
- ☆25Updated 2 months ago
- Some CTF Write-ups☆26Updated 4 years ago
- Leveraging patch diffing to discover new vulnerabilities☆139Updated last year
- A MBR Fuzzer☆31Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- A full-featured open-source Wi-Fi fuzzer☆197Updated 4 months ago
- ☆45Updated 5 months ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆78Updated 9 months ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year