mcw0 / pwn-hisilicon-dvrView external linksLinks
☆51Sep 7, 2017Updated 8 years ago
Alternatives and similar repositories for pwn-hisilicon-dvr
Users that are interested in pwn-hisilicon-dvr are comparing it to the libraries listed below
Sorting:
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- A debugger in Python for Cisco c3560☆10Apr 24, 2018Updated 7 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆45Sep 29, 2014Updated 11 years ago
- SandBox-Dumper makes use of multiple private libraries to provide exact locations of the application sandbox, application bundle and some…☆58May 13, 2021Updated 4 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- ☆17Oct 17, 2018Updated 7 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- Collection of AI and Security Papers☆27Apr 17, 2020Updated 5 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- My fuzzing workshop from PHDays9☆26May 24, 2019Updated 6 years ago
- .NET Binary Deserializer/Serializer - For all formats: [MC-NBFX], [MC-NBFS], [MC-NBFSE]☆20Feb 25, 2019Updated 6 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- source code☆183May 6, 2019Updated 6 years ago
- The slides from my Saintcon 2019 talk.☆48Feb 9, 2020Updated 6 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Mar 16, 2018Updated 7 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Apr 7, 2020Updated 5 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Sep 3, 2019Updated 6 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆63Nov 6, 2018Updated 7 years ago
- 非法域名挖掘与画像系统。☆36Jul 22, 2017Updated 8 years ago
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago
- CORS checking☆34Jul 16, 2018Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- A IDAPython script for searching overflows by IDA.☆21Sep 21, 2017Updated 8 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Oct 6, 2017Updated 8 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 3 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 6 years ago
- A collection of pwn execrise☆28Oct 31, 2019Updated 6 years ago
- CTF box with most tools installed☆89Aug 22, 2018Updated 7 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago