Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow
☆55Mar 23, 2016Updated 9 years ago
Alternatives and similar repositories for nginxpwn
Users that are interested in nginxpwn are comparing it to the libraries listed below
Sorting:
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Stony Brook University CFI library☆22Sep 30, 2014Updated 11 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- ☆39Mar 31, 2021Updated 4 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Find command injection and format string bugs in binaries☆17Feb 2, 2024Updated 2 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- exploit development☆49Mar 14, 2018Updated 7 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Test Suite and exemplary extensions of the "Attacking Browser Extensions" master's thesis☆28May 22, 2016Updated 9 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆37Nov 16, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- CVE-2013-2028 python exploit☆20Jun 27, 2020Updated 5 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Using simple seccomp filters☆26Aug 5, 2012Updated 13 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- Exploit code for CVE-2016-1757☆83Apr 27, 2016Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago