kpcyrd / defcon26-powLinks
Fast defcon 26 quals pow solver
☆25Updated 7 years ago
Alternatives and similar repositories for defcon26-pow
Users that are interested in defcon26-pow are comparing it to the libraries listed below
Sorting:
- Binary (In)security tool☆25Updated last year
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆35Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- ☆13Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- ☆22Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Copy of the contents at phrack.com☆38Updated 2 months ago
- yet another dirbuster☆19Updated 4 years ago
- Full-bin indexation of binary files☆95Updated 7 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- ☆26Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- A shellcode testing harness.☆69Updated 10 months ago
- ☆36Updated 12 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Bruteforce with a stream of permutations of a specific pattern☆27Updated 9 months ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆48Updated 4 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆97Updated 7 years ago
- Small Rust programs that do weird things☆30Updated 3 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Red Team Resources☆60Updated 6 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 7 months ago