nickboucher / trojan-sourceLinks
Trojan Source: Invisible Vulnerabilities
☆1,264Updated 2 years ago
Alternatives and similar repositories for trojan-source
Users that are interested in trojan-source are comparing it to the libraries listed below
Sorting:
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆790Updated 2 years ago
- ☆1,495Updated 2 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,351Updated 4 months ago
- Credentials Dumper for Linux using eBPF☆1,143Updated 9 months ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆806Updated last year
- Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.☆794Updated this week
- ☆1,117Updated 4 years ago
- 🔪 Leak git repositories from misconfigured websites☆1,572Updated 2 years ago
- Open source vulnerability DB and triage service.☆1,901Updated this week
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 3 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,709Updated 3 years ago
- Connect like there is no firewall. Securely.☆1,700Updated 2 weeks ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,495Updated last year
- Gather and update all available and newest CVEs with their PoC.☆7,042Updated this week
- Open Source Package Analysis☆834Updated 2 months ago
- Reverse proxies cheatsheet☆1,822Updated last year
- CVE-2021-4034 1day☆2,006Updated 3 years ago
- ☆2,080Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,182Updated last month
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,412Updated 11 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,444Updated 2 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,867Updated last year
- ☆324Updated last year
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,624Updated 2 weeks ago
- Portable Executable reversing tool with a friendly GUI☆3,134Updated last month
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆1,066Updated 2 years ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,619Updated last year
- ☆1,269Updated last month
- Security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.☆1,902Updated this week
- Extract files from any kind of container formats☆2,324Updated this week