Python program to exploit stack-based buffer overflows.
☆22Feb 24, 2021Updated 5 years ago
Alternatives and similar repositories for StackAttack
Users that are interested in StackAttack are comparing it to the libraries listed below
Sorting:
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- Shell Please 1.0 : Reverse shell code generator.☆36Jul 3, 2022Updated 3 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Nov 21, 2020Updated 5 years ago
- Unofficial list of approved tools for OSCP☆27Apr 25, 2023Updated 2 years ago
- A tool to generate malicious .deb files☆18Mar 6, 2018Updated 7 years ago
- Useful scripts for autokey☆29Oct 28, 2020Updated 5 years ago
- ☆23Jul 5, 2020Updated 5 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- Raspberry Pi powered Digital Clock for Amateur Radio using TM1637 4 digit displays☆11Mar 20, 2021Updated 4 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- ☆76Mar 24, 2021Updated 4 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 2 months ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 4 months ago
- ☆14Feb 12, 2026Updated 2 weeks ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Socks5man is a Socks5 management tool and Python library☆12Mar 10, 2023Updated 2 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- A greybox fuzzer for continuous integration☆10Dec 15, 2023Updated 2 years ago
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 3 years ago
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- ☆10Mar 31, 2016Updated 9 years ago
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Prototype compiler from AWS CloudFormation IaC templates into Logic.☆13Dec 5, 2023Updated 2 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- The Zonemaster GUI - part of the Zonemaster project☆17Feb 9, 2026Updated 3 weeks ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- ☆48Nov 14, 2021Updated 4 years ago
- wew oscp☆280Jun 28, 2022Updated 3 years ago
- Linux Remote Process Injection and Hooking Example - htop☆12Apr 30, 2021Updated 4 years ago
- Rust-based linux reverse shell listener.☆12Aug 7, 2024Updated last year
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 6 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year