misterch0c / firminator_backendLinks
The first open source vulnerability scanner for firmwares
☆195Updated 8 years ago
Alternatives and similar repositories for firminator_backend
Users that are interested in firminator_backend are comparing it to the libraries listed below
Sorting:
- Hodor! Fuzzer..☆129Updated 8 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- ☆192Updated 7 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated last month
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆174Updated 7 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆153Updated 8 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- A repository of challenges from various CTF competitions.☆156Updated 11 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆53Updated 9 years ago
- Various Scripts for Mobile Pen-testing with Frida☆76Updated 9 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- system scanner☆218Updated 3 years ago
- fuzz☆125Updated 9 years ago
- BSidesSF CTF 2017 release☆126Updated 3 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆209Updated 5 years ago
- my public code☆166Updated 8 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- ☆79Updated 9 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆326Updated 8 years ago
- PyAna - Analyzing the Windows shellcode☆247Updated 9 years ago
- Yet another CTF platform☆148Updated 7 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆152Updated 8 years ago
- ☆138Updated 7 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- A distributed fuzzing testing suite with web administration☆374Updated 6 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago