kientuong114 / docker-mitmLinks
A Man in the Middle proof of concept using docker containers
☆21Updated 4 years ago
Alternatives and similar repositories for docker-mitm
Users that are interested in docker-mitm are comparing it to the libraries listed below
Sorting:
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆45Updated 3 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆46Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆76Updated 3 months ago
- A tool for firmware cartography☆157Updated last month
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆87Updated 3 months ago
- Brings the power of ChatGPT to Ghidra!☆154Updated 11 months ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆33Updated 4 years ago
- Reverse engineering software using a full system simulator☆183Updated last week
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Where CTFs happen☆81Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 5 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 months ago
- Complete SMS packet manipulation☆113Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆90Updated 2 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated last year
- ☆25Updated 2 years ago
- PEDA - Python Exploit Development Assistance for GDB☆23Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- ☆63Updated 2 years ago
- A full-featured open-source Wi-Fi fuzzer☆191Updated 3 weeks ago
- ☆204Updated 8 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆114Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Kernel Read Write Execute☆43Updated 6 months ago
- Leveraging patch diffing to discover new vulnerabilities☆126Updated 9 months ago